{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:33:02Z","timestamp":1772119982703,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1700544"],"award-info":[{"award-number":["1700544"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-20-1-2734"],"award-info":[{"award-number":["N00014-20-1-2734"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471855","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"282-295","source":"Crossref","is-referenced-by-count":2,"title":["Practical Speech Re-use Prevention in Voice-driven Services"],"prefix":"10.1145","author":[{"given":"Yangyong","family":"Zhang","sequence":"first","affiliation":[{"name":"Texas A&amp;M Univeristy, US"}]},{"given":"Sunpreet","family":"Arora","sequence":"additional","affiliation":[{"name":"Visa Research, US"}]},{"given":"Maliheh","family":"Shirvanian","sequence":"additional","affiliation":[{"name":"Visa Research, US"}]},{"given":"Jianwei","family":"Huang","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, US"}]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, US"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Alexa for Business. https:\/\/aws.amazon.com\/alexaforbusiness\/.  2020. Alexa for Business. https:\/\/aws.amazon.com\/alexaforbusiness\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Amazon Alexa Pay in Gas Station.https:\/\/bit.ly\/37v25xN.  2020. Amazon Alexa Pay in Gas Station.https:\/\/bit.ly\/37v25xN."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Black Hat 2018: Voice Authentication is Broken. https:\/\/bit.ly\/3mxQIto.  2020. Black Hat 2018: Voice Authentication is Broken. https:\/\/bit.ly\/3mxQIto."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. Equal-loudness contour.https:\/\/bit.ly\/2LF1ukH.  2020. Equal-loudness contour.https:\/\/bit.ly\/2LF1ukH."},{"key":"e_1_3_2_1_5_1","volume-title":"Face ID Security. https:\/\/apple.co\/34mmO59","unstructured":"2020. Face ID Security. https:\/\/apple.co\/34mmO59 . 2020. Face ID Security. https:\/\/apple.co\/34mmO59."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. IoSR Matlab Toolbox: Equal-loudness Contour Mapping. https:\/\/bit.ly\/2Wtd1Wz.  2020. IoSR Matlab Toolbox: Equal-loudness Contour Mapping. https:\/\/bit.ly\/2Wtd1Wz."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. Just say it: The future of search is voice and personal digital assistants. https:\/\/www.campaignlive.co.uk\/article\/just-say-it-future-search-voice-personal-digital-assistants\/1392459.  2020. Just say it: The future of search is voice and personal digital assistants. https:\/\/www.campaignlive.co.uk\/article\/just-say-it-future-search-voice-personal-digital-assistants\/1392459."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. Microsoft Azure Speaker Recognition - Verification. https:\/\/bit.ly\/3h82Sbh.  2020. Microsoft Azure Speaker Recognition - Verification. https:\/\/bit.ly\/3h82Sbh."},{"key":"e_1_3_2_1_9_1","unstructured":"2020. Microsoft Cognitive Services. https:\/\/bit.ly\/38haWCH.  2020. Microsoft Cognitive Services. https:\/\/bit.ly\/38haWCH."},{"key":"e_1_3_2_1_10_1","unstructured":"2020. MP3 Wikipedia. https:\/\/en.wikipedia.org\/wiki\/MP3.  2020. MP3 Wikipedia. https:\/\/en.wikipedia.org\/wiki\/MP3."},{"key":"e_1_3_2_1_11_1","unstructured":"2020. Paysafe Study. https:\/\/bit.ly\/2WtgjJl.  2020. Paysafe Study. https:\/\/bit.ly\/2WtgjJl."},{"key":"e_1_3_2_1_12_1","unstructured":"2020. Personal Music Players & Hearing. https:\/\/bit.ly\/34tyWkN.  2020. Personal Music Players & Hearing. https:\/\/bit.ly\/34tyWkN."},{"key":"e_1_3_2_1_13_1","unstructured":"2020. Voice Password in Wechat. https:\/\/zd.net\/3myAGQ2.  2020. Voice Password in Wechat. https:\/\/zd.net\/3myAGQ2."},{"key":"e_1_3_2_1_14_1","unstructured":"2020. Voice Payment Survey. https:\/\/bit.ly\/3p6k97z.  2020. Voice Payment Survey. https:\/\/bit.ly\/3p6k97z."},{"key":"e_1_3_2_1_15_1","unstructured":"2020. Will voice assistant change workplace. https:\/\/bit.ly\/3mxRDKm.  2020. Will voice assistant change workplace. https:\/\/bit.ly\/3mxRDKm."},{"key":"e_1_3_2_1_16_1","unstructured":"2021. Alexa skill: 300 000 daily users. https:\/\/vux.world\/google-assistant-500m-active-users-popular-alexa-skill-300000-daily-users\/.  2021. Alexa skill: 300 000 daily users. https:\/\/vux.world\/google-assistant-500m-active-users-popular-alexa-skill-300000-daily-users\/."},{"key":"e_1_3_2_1_17_1","volume-title":"Echo Device Light Indicator. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=GKLDRFT7FP4FZE56","unstructured":"2021. Echo Device Light Indicator. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=GKLDRFT7FP4FZE56 . 2021. Echo Device Light Indicator. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=GKLDRFT7FP4FZE56."},{"key":"e_1_3_2_1_18_1","unstructured":"2021. Paypal Voice Assistant Application with Pins. https:\/\/bit.ly\/3h8QkR6.  2021. Paypal Voice Assistant Application with Pins. https:\/\/bit.ly\/3h8QkR6."},{"key":"e_1_3_2_1_19_1","unstructured":"2021. Voice Password Applications in Google Play. https:\/\/bit.ly\/38dq1oG.  2021. Voice Password Applications in Google Play. https:\/\/bit.ly\/38dq1oG."},{"key":"e_1_3_2_1_20_1","unstructured":"2021. Voice Password in Samsung Bixby. https:\/\/bit.ly\/34rlPAN.  2021. Voice Password in Samsung Bixby. https:\/\/bit.ly\/34rlPAN."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"H. Abdullah W. Garcia C. Peeters P. Traynor K.R.B. Butler and J. Wilson. 2019. Practical hidden voice attacks against speech and speaker recognition systems. arXiv preprint 1904.05734(2019).  H. Abdullah W. Garcia C. Peeters P. Traynor K.R.B. Butler and J. Wilson. 2019. Practical hidden voice attacks against speech and speaker recognition systems. arXiv preprint 1904.05734(2019).","DOI":"10.14722\/ndss.2019.23362"},{"key":"e_1_3_2_1_22_1","volume-title":"Void: A fast and light voice liveness detection system. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2685\u20132702.","author":"Ahmed E.","year":"2020","unstructured":"M.\u00a0 E. Ahmed , I. Kwak , J.\u00a0 H. Huh , I. Kim , T. Oh , and H. Kim . 2020 . Void: A fast and light voice liveness detection system. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2685\u20132702. M.\u00a0E. Ahmed, I. Kwak, J.\u00a0H. Huh, I. Kim, T. Oh, and H. Kim. 2020. Void: A fast and light voice liveness detection system. In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2685\u20132702."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/6046.923822"},{"key":"e_1_3_2_1_24_1","volume-title":"ACM symposium on Theory of computing.","author":"Bellare M.","unstructured":"M. Bellare and P. Rogaway . 1995. Provably secure session key distribution: the three party case . In ACM symposium on Theory of computing. M. Bellare and P. Rogaway. 1995. Provably secure session key distribution: the three party case. In ACM symposium on Theory of computing."},{"key":"e_1_3_2_1_25_1","volume-title":"IEEE Symposium on Security and Privacy(2021)","author":"Chen G.","unstructured":"G. Chen , S. Chen , L. Fan , X. Du , Z. Zhao , F. Song , and Y. Liu . 2021. Who is real bob? adversarial attacks on speaker recognition systems . IEEE Symposium on Security and Privacy(2021) . G. Chen, S. Chen, L. Fan, X. Du, Z. Zhao, F. Song, and Y. Liu. 2021. Who is real bob? adversarial attacks on speaker recognition systems. IEEE Symposium on Security and Privacy(2021)."},{"key":"e_1_3_2_1_26_1","volume-title":"International Conference on Distributed Computing Systems.","author":"Chen S.","unstructured":"S. Chen , K. Ren , S. Piao , C. Wang , Q. Wang , J. Weng , L. Su , and A. Mohaisen . 2017. You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones . In International Conference on Distributed Computing Systems. S. Chen, K. Ren, S. Piao, C. Wang, Q. Wang, J. Weng, L. Su, and A. Mohaisen. 2017. You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones. In International Conference on Distributed Computing Systems."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of NDSS","author":"Chen T.","year":"2020","unstructured":"T. Chen , L. Shangguan , Z. Li , and K. Jamieson . 2020. Metamorph: Injecting inaudible commands into over-the-air voice controlled systems . Proceedings of NDSS ( 2020 ). T. Chen, L. Shangguan, Z. Li, and K. Jamieson. 2020. Metamorph: Injecting inaudible commands into over-the-air voice controlled systems. Proceedings of NDSS (2020)."},{"key":"e_1_3_2_1_28_1","volume-title":"International Workshop on Information Hiding.","author":"Cox J.","unstructured":"I.\u00a0 J. Cox , J. Kilian , T. Leighton , and T. Shamoon . 1996. A secure, robust watermark for multimedia . In International Workshop on Information Hiding. I.\u00a0J. Cox, J. Kilian, T. Leighton, and T. Shamoon. 1996. A secure, robust watermark for multimedia. In International Workshop on Information Hiding."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"N. Cvejic. 2004. Algorithms for audio watermarking and steganography.  N. Cvejic. 2004. Algorithms for audio watermarking and steganography.","DOI":"10.4018\/978-1-59140-518-4.ch006"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"N. Cvejic and T. Sepp\u00e4nen. 2004. Spread spectrum audio watermarking using frequency hopping and attack characterization. Signal processing 84 1 (2004) 207\u2013213.  N. Cvejic and T. Sepp\u00e4nen. 2004. Spread spectrum audio watermarking using frequency hopping and attack characterization. Signal processing 84 1 (2004) 207\u2013213.","DOI":"10.1016\/j.sigpro.2003.10.016"},{"key":"e_1_3_2_1_31_1","volume-title":"Differential evolution: A survey of the state-of-the-art","author":"Das S.","year":"2010","unstructured":"S. Das and P.\u00a0 N. Suganthan . 2010. Differential evolution: A survey of the state-of-the-art . IEEE transactions on evolutionary computation 15, 1( 2010 ), 4\u201331. S. Das and P.\u00a0N. Suganthan. 2010. Differential evolution: A survey of the state-of-the-art. IEEE transactions on evolutionary computation 15, 1(2010), 4\u201331."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117823"},{"key":"e_1_3_2_1_33_1","volume-title":"EGregor: An Eldritch Privacy Mental Model for Smart Assistants. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1\u20139.","author":"Geeng C.","year":"2020","unstructured":"C. Geeng . 2020 . EGregor: An Eldritch Privacy Mental Model for Smart Assistants. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1\u20139. C. Geeng. 2020. EGregor: An Eldritch Privacy Mental Model for Smart Assistants. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1\u20139."},{"key":"e_1_3_2_1_34_1","volume-title":"International Conference on Computer Communication and Networks.","author":"Gong Y.","unstructured":"Y. Gong and C. Poellabauer . 2018. Protecting voice controlled systems using sound source identification based on acoustic cues . In International Conference on Computer Communication and Networks. Y. Gong and C. Poellabauer. 2018. Protecting voice controlled systems using sound source identification based on acoustic cues. In International Conference on Computer Communication and Networks."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Y. Gong J. Yang J. Huber M. MacKnight and C. Poellabauer. 2019. ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems. arXiv preprint 1904.03365(2019).  Y. Gong J. Yang J. Huber M. MacKnight and C. Poellabauer. 2019. ReMASC: Realistic Replay Attack Corpus for Voice Controlled Systems. arXiv preprint 1904.03365(2019).","DOI":"10.21437\/Interspeech.2019-1541"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.2088"},{"key":"e_1_3_2_1_37_1","volume-title":"SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.. In NDSS, Vol.\u00a01. 53\u201355.","author":"Kang Min\u00a0Suk","year":"2016","unstructured":"Min\u00a0Suk Kang , Virgil\u00a0 D Gligor , Vyas Sekar , 2016 . SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.. In NDSS, Vol.\u00a01. 53\u201355. Min\u00a0Suk Kang, Virgil\u00a0D Gligor, Vyas Sekar, 2016. SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.. In NDSS, Vol.\u00a01. 53\u201355."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"T. Kinnunen M. Sahidullah H. Delgado M. Todisco N. Evans J. Yamagishi and K.\u00a0A. Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).  T. Kinnunen M. Sahidullah H. Delgado M. Todisco N. Evans J. Yamagishi and K.\u00a0A. Lee. 2017. The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection. (2017).","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809384"},{"key":"e_1_3_2_1_40_1","volume-title":"PIERS Proceedings","author":"Kumar P.","year":"2010","unstructured":"P. Kumar , M. Jayakumar , and A.V. Vidyapeetham . 2010. Comparison of bit error rate for propagation mechanisms of millimeter waves in a practical communication systems employing PSK and FSK . PIERS Proceedings ( 2010 ). P. Kumar, M. Jayakumar, and A.V. Vidyapeetham. 2010. Comparison of bit error rate for propagation mechanisms of millimeter waves in a practical communication systems employing PSK and FSK. PIERS Proceedings (2010)."},{"key":"e_1_3_2_1_41_1","volume-title":"Digital communication","author":"Lee A.","unstructured":"E.\u00a0 A. Lee and D.\u00a0 G. Messerschmitt . 2012. Digital communication . Springer Science & Business Media . E.\u00a0A. Lee and D.\u00a0G. Messerschmitt. 2012. Digital communication. Springer Science & Business Media."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535398"},{"key":"e_1_3_2_1_43_1","first-page":"836","article-title":"Replay spoofing detection for automatic speaker verification system","volume":"16","author":"Leng M.","year":"2020","unstructured":"M. Leng , S.\u00a0 S. Arora , and K. Wagner . 2020 . Replay spoofing detection for automatic speaker verification system . US Patent App. 16\/535 , 836 . M. Leng, S.\u00a0S. Arora, and K. Wagner. 2020. Replay spoofing detection for automatic speaker verification system. US Patent App. 16\/535,836.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_44_1","volume-title":"Audio Engineering Society Convention 105","author":"Neubauer C.","unstructured":"C. Neubauer and J. Herre . 1998. Digital watermarking and its influence on audio quality . In Audio Engineering Society Convention 105 . Audio Engineering Society. C. Neubauer and J. Herre. 1998. Digital watermarking and its influence on audio quality. In Audio Engineering Society Convention 105. Audio Engineering Society."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1143\/JJAP.49.07HG10"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2016.10.003"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"S. Pradhan W. Sun G. Baig and L. Qiu. 2019. Combating Replay Attacks Against Voice Assistants. ACM Interactive Mobile Wearable and Ubiquitous Technologies 3 3(2019).  S. Pradhan W. Sun G. Baig and L. Qiu. 2019. Combating Replay Attacks Against Voice Assistants. ACM Interactive Mobile Wearable and Ubiquitous Technologies 3 3(2019).","DOI":"10.1145\/3351258"},{"key":"e_1_3_2_1_48_1","volume-title":"27th USENIX Security Symposium.","author":"Scaife N.","unstructured":"N. Scaife , C. Peeters , and P. Traynor . 2018. Fear the reaper: Characterization and fast detection of card skimmers . In 27th USENIX Security Symposium. N. Scaife, C. Peeters, and P. Traynor. 2018. Fear the reaper: Characterization and fast detection of card skimmers. In 27th USENIX Security Symposium."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20010029"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.003"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1121\/1.1763601"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"M.\u00a0D. Swanson B. Zhu A.\u00a0H. Tewfik and L. Boney. 1998. Robust audio watermarking using perceptual masking. Signal processing 66 3 (1998) 337\u2013355.  M.\u00a0D. Swanson B. Zhu A.\u00a0H. Tewfik and L. Boney. 1998. Robust audio watermarking using perceptual masking. Signal processing 66 3 (1998) 337\u2013355.","DOI":"10.1016\/S0165-1684(98)00014-0"},{"key":"e_1_3_2_1_54_1","volume-title":"Acoustic communication","author":"Truax B.","unstructured":"B. Truax . 2001. Acoustic communication . Greenwood Publishing Group . B. Truax. 2001. Acoustic communication. Greenwood Publishing Group."},{"key":"e_1_3_2_1_55_1","volume-title":"Efficient Nonce-based Authentication Scheme for Session Initiation Protocol.IJ Network Security 9, 1","author":"Tsai L.","year":"2009","unstructured":"J.\u00a0 L. Tsai . 2009. Efficient Nonce-based Authentication Scheme for Session Initiation Protocol.IJ Network Security 9, 1 ( 2009 ), 12\u201316. J.\u00a0L. Tsai. 2009. Efficient Nonce-based Authentication Scheme for Session Initiation Protocol.IJ Network Security 9, 1 (2009), 12\u201316."},{"key":"e_1_3_2_1_56_1","volume-title":"International Symposium on Room Acoustics.","author":"Wabnitz A.","unstructured":"A. Wabnitz , N. Epain , C. Jin , and A. Van\u00a0Schaik . 2010. Room acoustics simulation for multichannel microphone arrays . In International Symposium on Room Acoustics. A. Wabnitz, N. Epain, C. Jin, and A. Van\u00a0Schaik. 2010. Room acoustics simulation for multichannel microphone arrays. In International Symposium on Room Acoustics."},{"key":"e_1_3_2_1_57_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security.","author":"Wang S.","unstructured":"S. Wang , J. Cao , X. He , K. Sun , and Q. Li . 2020. When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition . In ACM SIGSAC Conference on Computer and Communications Security. S. Wang, J. Cao, X. He, K. Sun, and Q. Li. 2020. When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition. In ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_58_1","volume-title":"Critical values and probability levels for the Wilcoxon rank sum test and the Wilcoxon signed rank test. Selected tables in mathematical statistics 1","author":"Wilcoxon F.","year":"1970","unstructured":"F. Wilcoxon , S.\u00a0 K. Katti , and R.\u00a0 A. Wilcox . 1970. Critical values and probability levels for the Wilcoxon rank sum test and the Wilcoxon signed rank test. Selected tables in mathematical statistics 1 ( 1970 ), 171\u2013259. F. Wilcoxon, S.\u00a0K. Katti, and R.\u00a0A. Wilcox. 1970. Critical values and probability levels for the Wilcoxon rank sum test and the Wilcoxon signed rank test. Selected tables in mathematical statistics 1 (1970), 171\u2013259."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2004.838265"},{"key":"e_1_3_2_1_60_1","volume-title":"IEEE International Conference on Acoustics, Speech and Signal Processing.","author":"Xiong W.","unstructured":"W. Xiong , L. Wu , F. Alleva , J. Droppo , X. Huang , and A. Stolcke . 2018. The Microsoft 2017 conversational speech recognition system . In IEEE International Conference on Acoustics, Speech and Signal Processing. W. Xiong, L. Wu, F. Alleva, J. Droppo, X. Huang, and A. Stolcke. 2018. The Microsoft 2017 conversational speech recognition system. In IEEE International Conference on Acoustics, Speech and Signal Processing."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","location":"San Sebastian Spain","acronym":"RAID '21"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471855","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471855","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471855"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":61,"alternative-id":["10.1145\/3471621.3471855","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471855","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}