{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:00Z","timestamp":1750220460268,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CCF2028876, CCF1909963, CNS1801630, CNS1714807, CNS1526524, CNS1547350"],"award-info":[{"award-number":["CCF2028876, CCF1909963, CNS1801630, CNS1714807, CNS1526524, CNS1547350"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-18-1-0221"],"award-info":[{"award-number":["W911NF-18-1-0221"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1145\/3433210.3437523","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:26:39Z","timestamp":1622820399000},"page":"82-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks"],"prefix":"10.1145","author":[{"given":"Yi","family":"Wu","sequence":"first","affiliation":[{"name":"University of Tennessee, Knoxville, TN, USA"}]},{"given":"Xiangyu","family":"Xu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shang Hai, China"}]},{"given":"Payton R.","family":"Walker","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Tennessee, Knoxville, TN, USA"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Yingying","family":"Chen","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]},{"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shang Hai, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Kevin RB Butler, and Joseph Wilson","author":"Abdullah Hadi","year":"2019","unstructured":"Hadi Abdullah , Washington Garcia , Christian Peeters , Patrick Traynor , Kevin RB Butler, and Joseph Wilson . 2019 . Practical hidden voice attacks against speech and speaker recognition systems. arXiv preprint arXiv:1904.05734 (2019). Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin RB Butler, and Joseph Wilson. 2019. Practical hidden voice attacks against speech and speaker recognition systems. arXiv preprint arXiv:1904.05734 (2019)."},{"key":"e_1_3_2_1_2_1","volume-title":"SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. ArXiv","author":"Abdullah Hadi","year":"2020","unstructured":"Hadi Abdullah , Kevin M. Warren , Vincent Bindschaedler , Nicolas Papernot , and Patrick Traynor . 2020. SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. ArXiv , Vol. abs\/ 2007 .06622 ( 2020 ). Hadi Abdullah, Kevin M. Warren, Vincent Bindschaedler, Nicolas Papernot, and Patrick Traynor. 2020. SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. ArXiv, Vol. abs\/2007.06622 (2020)."},{"key":"e_1_3_2_1_3_1","unstructured":"Moustafa Alzantot Bharathan Balaji and Mani Srivastava. 2018. Did you hear that? Adversarial Examples Against Automatic Speech Recognition. arxiv: cs.CL\/1801.00554  Moustafa Alzantot Bharathan Balaji and Mani Srivastava. 2018. Did you hear that? Adversarial Examples Against Automatic Speech Recognition. arxiv: cs.CL\/1801.00554"},{"key":"e_1_3_2_1_4_1","volume-title":"Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 513--530. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/carlini Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 513--530. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/carlini"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"volume-title":"You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 183--195","author":"Chen S.","key":"e_1_3_2_1_6_1","unstructured":"S. Chen , K. Ren , S. Piao , C. Wang , Q. Wang , J. Weng , L. Su , and A. Mohaisen . 2017 . You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 183--195 . S. Chen, K. Ren, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, and A. Mohaisen. 2017. You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 183--195."},{"key":"e_1_3_2_1_7_1","volume-title":"Houdini: Fooling deep structured visual and speech recognition models with adversarial examples. In Advances in neural information processing systems. 6977--6987.","author":"Cisse Moustapha M","year":"2017","unstructured":"Moustapha M Cisse , Yossi Adi , Natalia Neverova , and Joseph Keshet . 2017 . Houdini: Fooling deep structured visual and speech recognition models with adversarial examples. In Advances in neural information processing systems. 6977--6987. Moustapha M Cisse, Yossi Adi, Natalia Neverova, and Joseph Keshet. 2017. Houdini: Fooling deep structured visual and speech recognition models with adversarial examples. In Advances in neural information processing systems. 6977--6987."},{"key":"e_1_3_2_1_8_1","unstructured":"Statista Research Department. 2020. Number of voice assistants in use worldwide 2019--2023. https:\/\/www.statista.com\/statistics\/973815\/worldwide-digital-voice-assistant-in-use\/  Statista Research Department. 2020. Number of voice assistants in use worldwide 2019--2023. https:\/\/www.statista.com\/statistics\/973815\/worldwide-digital-voice-assistant-in-use\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666623"},{"key":"e_1_3_2_1_10_1","unstructured":"Jonathan Driedger and Meinard M\u00fcller. 2014. TSM Toolbox: MATLAB Implementations of Time-Scale Modification Algorithms.. In DAFx. Citeseer 249--256.  Jonathan Driedger and Meinard M\u00fcller. 2014. TSM Toolbox: MATLAB Implementations of Time-Scale Modification Algorithms.. In DAFx. Citeseer 249--256."},{"key":"e_1_3_2_1_11_1","volume-title":"pyAudioAnalysis: An Open-Source Python Library for Audio Signal Analysis. PloS one","author":"Giannakopoulos Theodoros","year":"2015","unstructured":"Theodoros Giannakopoulos . 2015. pyAudioAnalysis: An Open-Source Python Library for Audio Signal Analysis. PloS one , Vol. 10 , 12 ( 2015 ). Theodoros Giannakopoulos. 2015. pyAudioAnalysis: An Open-Source Python Library for Audio Signal Analysis. PloS one, Vol. 10, 12 (2015)."},{"key":"e_1_3_2_1_12_1","unstructured":"Yuan Gong and Christian Poellabauer. 2017. Crafting Adversarial Examples For Speech Paralinguistics Applications. arxiv: cs.LG\/1711.03280  Yuan Gong and Christian Poellabauer. 2017. Crafting Adversarial Examples For Speech Paralinguistics Applications. arxiv: cs.LG\/1711.03280"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1044\/jshd.1404.363"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2003.1200027"},{"key":"e_1_3_2_1_15_1","unstructured":"Md Rashidul Hasan Mustafa Jamil MGRMS Rahman etal 2004. Speaker identification using mel frequency cepstral coefficients. variations Vol. 1 4 (2004).  Md Rashidul Hasan Mustafa Jamil MGRMS Rahman et al. 2004. Speaker identification using mel frequency cepstral coefficients. variations Vol. 1 4 (2004)."},{"key":"e_1_3_2_1_17_1","article-title":"VoCo","volume":"36","author":"Jin Zeyu","year":"2017","unstructured":"Zeyu Jin , Gautham J. Mysore , Stephen Diverdi , Jingwan Lu , and Adam Finkelstein . 2017 . VoCo : Text-Based Insertion and Replacement in Audio Narration. ACM Trans. Graph. , Vol. 36 , 4, Article Article 96 (July 2017), 13 pages. https:\/\/doi.org\/10.1145\/3072959.3073702 Zeyu Jin, Gautham J. Mysore, Stephen Diverdi, Jingwan Lu, and Adam Finkelstein. 2017. VoCo: Text-Based Insertion and Replacement in Audio Narration. ACM Trans. Graph., Vol. 36, 4, Article Article 96 (July 2017), 13 pages. https:\/\/doi.org\/10.1145\/3072959.3073702","journal-title":"Text-Based Insertion and Replacement in Audio Narration. ACM Trans. Graph."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Eigth International Conference on Language Resources and Evaluation (LREC","author":"Korvas Matvej","year":"2014","unstructured":"Matvej Korvas , Ondvrej Pl\u00e1tek , Ondvrej Duvsek , Luk\u00e1vs v Zilka , and Filip Jurvc\u00edvcek . 2014 . Free English and Czech telephone speech corpus shared under the CC-BY-SA 3.0 license . In Proceedings of the Eigth International Conference on Language Resources and Evaluation (LREC 2014). To Appear. Matvej Korvas, Ondvrej Pl\u00e1tek, Ondvrej Duvsek, Luk\u00e1vs vZilka, and Filip Jurvc\u00edvcek. 2014. Free English and Czech telephone speech corpus shared under the CC-BY-SA 3.0 license. In Proceedings of the Eigth International Conference on Language Resources and Evaluation (LREC 2014). To Appear."},{"key":"e_1_3_2_1_19_1","unstructured":"Paige Leskin. 2018. Here's how to use Duplex Google's crazy new service that impersonates a human voice to make appointments on your behalf. https:\/\/www.businessinsider.com\/google-appointment-booking-reservation-tool-duplex-pixel-phones-how-to-2018--11  Paige Leskin. 2018. Here's how to use Duplex Google's crazy new service that impersonates a human voice to make appointments on your behalf. https:\/\/www.businessinsider.com\/google-appointment-booking-reservation-tool-duplex-pixel-phones-how-to-2018--11"},{"key":"e_1_3_2_1_20_1","volume-title":"Inaccessibility of CAPTCHA: Alternatives to visual Turing Tests on the Web. web page. URL: http:\/\/www. w3. org\/TR\/turingtest","author":"May Matt","year":"2005","unstructured":"Matt May . 2005. Inaccessibility of CAPTCHA: Alternatives to visual Turing Tests on the Web. web page. URL: http:\/\/www. w3. org\/TR\/turingtest ( 2005 ). Matt May. 2005. Inaccessibility of CAPTCHA: Alternatives to visual Turing Tests on the Web. web page. URL: http:\/\/www. w3. org\/TR\/turingtest (2005)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_30"},{"key":"e_1_3_2_1_22_1","volume-title":"English Language Speech Recognition Using MFCC and HMM. In 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE). 1--7. https:\/\/doi.org\/10","author":"Naithani K.","year":"2018","unstructured":"K. Naithani , V. M. Thakkar , and A. Semwal . 2018 . English Language Speech Recognition Using MFCC and HMM. In 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE). 1--7. https:\/\/doi.org\/10 .1109\/RICE. 2018 .8509046 K. Naithani, V. M. Thakkar, and A. Semwal. 2018. English Language Speech Recognition Using MFCC and HMM. In 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE). 1--7. https:\/\/doi.org\/10.1109\/RICE.2018.8509046"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6393(95)00009-D"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Phil Rose. 2002. Forensic speaker identification. cRc Press.  Phil Rose. 2002. Forensic speaker identification. cRc Press.","DOI":"10.1201\/9780203166369"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_26_1","volume-title":"Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding. arXiv preprint arXiv:1808.05665","author":"Sch\u00f6nherr Lea","year":"2018","unstructured":"Lea Sch\u00f6nherr , Katharina Kohls , Steffen Zeiler , Thorsten Holz , and Dorothea Kolossa . 2018. Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding. arXiv preprint arXiv:1808.05665 ( 2018 ). Lea Sch\u00f6nherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa. 2018. Adversarial attacks against automatic speech recognition systems via psychoacoustic hiding. arXiv preprint arXiv:1808.05665 (2018)."},{"key":"e_1_3_2_1_27_1","volume-title":"Quantifying the Breakability of Voice Assistants. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom. 1--11","author":"Shirvanian M.","year":"2019","unstructured":"M. Shirvanian , S. Vo , and N. Saxena . 2019 . Quantifying the Breakability of Voice Assistants. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom. 1--11 . https:\/\/doi.org\/10.1109\/PERCOM. 2019 .8767399 M. Shirvanian, S. Vo, and N. Saxena. 2019. Quantifying the Breakability of Voice Assistants. In 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom. 1--11. https:\/\/doi.org\/10.1109\/PERCOM.2019.8767399"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00026"},{"key":"e_1_3_2_1_29_1","volume-title":"9th USENIX Workshop on Offensive Technologies (WOOT 15)","author":"Vaidya Tavish","year":"2015","unstructured":"Tavish Vaidya , Yuankai Zhang , Micah Sherr , and Clay Shields . 2015 . Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition . In 9th USENIX Workshop on Offensive Technologies (WOOT 15) . USENIX Association, Washington, D.C. https:\/\/www.usenix.org\/conference\/woot15\/workshop-program\/presentation\/vaidya Tavish Vaidya, Yuankai Zhang, Micah Sherr, and Clay Shields. 2015. Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. In 9th USENIX Workshop on Offensive Technologies (WOOT 15). USENIX Association, Washington, D.C. https:\/\/www.usenix.org\/conference\/woot15\/workshop-program\/presentation\/vaidya"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2016.7537163"},{"volume-title":"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium .","author":"Yuan Xuejing","key":"e_1_3_2_1_31_1","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , Xiaofeng Wang , and Carl A. Gunter . 2018 . CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium . Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, and Carl A. Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. In USENIX Security Symposium ."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_33_1","volume-title":"Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars","author":"Zhou Man","year":"2019","unstructured":"Man Zhou , Zhan Qin , Xiu Lin , Shengshan Hu , Qian Wang , and Kaili Ren . 2019. Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars . IEEE Wireless Communications, Vol . PP ( 04 2019 ), 1--6. https:\/\/doi.org\/10.1109\/MWC.2019.1800477 Man Zhou, Zhan Qin, Xiu Lin, Shengshan Hu, Qian Wang, and Kaili Ren. 2019. Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars. IEEE Wireless Communications, Vol. PP (04 2019), 1--6. https:\/\/doi.org\/10.1109\/MWC.2019.1800477"}],"event":{"name":"ASIA CCS '21: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Hong Kong","acronym":"ASIA CCS '21"},"container-title":["Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3437523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3433210.3437523","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3437523","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3437523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:11Z","timestamp":1750193291000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3437523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":32,"alternative-id":["10.1145\/3433210.3437523","10.1145\/3433210"],"URL":"https:\/\/doi.org\/10.1145\/3433210.3437523","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}