{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:45:35Z","timestamp":1759092335802,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3468218.3469048","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T17:52:26Z","timestamp":1624297946000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks"],"prefix":"10.1145","author":[{"given":"Morriel","family":"Kasher","sequence":"first","affiliation":[{"name":"Rutgers University"}]},{"given":"Michael","family":"Zhao","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Aryeh","family":"Greenberg","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Devin","family":"Gulati","sequence":"additional","affiliation":[{"name":"Rutgers University"}]},{"given":"Silvija","family":"Kokalj-Filipovic","sequence":"additional","affiliation":[{"name":"Perspecta Labs Inc"}]},{"given":"Predrag","family":"Spasojevic","sequence":"additional","affiliation":[{"name":"Rutgers University"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Wagner","author":"Carlini Nicholas","year":"2018","unstructured":"Nicholas Carlini and David A . Wagner . 2018 . Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR abs\/1801.01944 (2018). arXiv:1801.01944 http:\/\/arxiv.org\/abs\/1801.01944 Nicholas Carlini and David A. Wagner. 2018. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR abs\/1801.01944 (2018). arXiv:1801.01944 http:\/\/arxiv.org\/abs\/1801.01944"},{"key":"e_1_3_2_1_2_1","volume-title":"Air Ultrasonic Ceramic Transducers 400ST\/R160. Retrieved","author":"S. Square Enterprise Company Limited Pro-Wave Electronics Corporation","year":"2020","unstructured":"S. Square Enterprise Company Limited Pro-Wave Electronics Corporation . 2019. Air Ultrasonic Ceramic Transducers 400ST\/R160. Retrieved May 8, 2020 from http:\/\/www.farnell.com\/datasheets\/1686089.pdf?_ga=2.256607115.1881374495.1588917674-2094016181.1588917674 S. Square Enterprise Company Limited Pro-Wave Electronics Corporation. 2019. Air Ultrasonic Ceramic Transducers 400ST\/R160. Retrieved May 8, 2020 from http:\/\/www.farnell.com\/datasheets\/1686089.pdf?_ga=2.256607115.1881374495.1588917674-2094016181.1588917674"},{"key":"e_1_3_2_1_3_1","volume-title":"NI myDAQ Device Specifications. Retrieved","author":"National Instruments. 2019.","year":"2020","unstructured":"National Instruments. 2019. NI myDAQ Device Specifications. Retrieved May 8, 2020 from https:\/\/www.ni.com\/pdf\/manuals\/373061g.pdf National Instruments. 2019. NI myDAQ Device Specifications. Retrieved May 8, 2020 from https:\/\/www.ni.com\/pdf\/manuals\/373061g.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395352.3402629"},{"key":"e_1_3_2_1_5_1","unstructured":"Test Equipment Solutions Ltd. 2019. Arbitrary\/Function Generators. Retrieved May 8 2020 from http:\/\/www.testequipmenthq.com\/datasheets\/TEKTRONIX-AFG3021-Datasheet.pdf  Test Equipment Solutions Ltd. 2019. Arbitrary\/Function Generators. Retrieved May 8 2020 from http:\/\/www.testequipmenthq.com\/datasheets\/TEKTRONIX-AFG3021-Datasheet.pdf"},{"key":"e_1_3_2_1_6_1","unstructured":"Yao Qin Nicholas Carlini Ian Goodfellow Garrison Cottrell and Colin Raffel. 2019. Imperceptible Robust and Targeted Adversarial Examples for Automatic Speech Recognition. arXiv:1903.10346 [eess.AS]  Yao Qin Nicholas Carlini Ian Goodfellow Garrison Cottrell and Colin Raffel. 2019. Imperceptible Robust and Targeted Adversarial Examples for Automatic Speech Recognition. arXiv:1903.10346 [eess.AS]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081366"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138836"},{"key":"e_1_3_2_1_9_1","volume-title":"Robust Audio Adversarial Example for a Physical Attack. CoRR abs\/1810.11793","author":"Yakura Hiromu","year":"2018","unstructured":"Hiromu Yakura and Jun Sakuma . 2018. Robust Audio Adversarial Example for a Physical Attack. CoRR abs\/1810.11793 ( 2018 ). arXiv:1810.11793 http:\/\/arxiv.org\/abs\/1810.11793 Hiromu Yakura and Jun Sakuma. 2018. Robust Audio Adversarial Example for a Physical Attack. CoRR abs\/1810.11793 (2018). arXiv:1810.11793 http:\/\/arxiv.org\/abs\/1810.11793"},{"volume-title":"Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition. In the 27th USENIX Conf. on Security.","author":"Yuan","key":"e_1_3_2_1_10_1","unstructured":"Yuan , Xuejing et al. 2018 . Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition. In the 27th USENIX Conf. on Security. Yuan, Xuejing et al. 2018. Commandersong: A Systematic Approach for Practical Adversarial Voice Recognition. In the 27th USENIX Conf. on Security."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21"},"container-title":["Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469048","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:07Z","timestamp":1750195687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469048"}},"subtitle":["Invited Paper"],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":11,"alternative-id":["10.1145\/3468218.3469048","10.1145\/3468218"],"URL":"https:\/\/doi.org\/10.1145\/3468218.3469048","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}