{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T18:00:52Z","timestamp":1776362452517,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1714807, CNS-2030501, CNS-2139358"],"award-info":[{"award-number":["CNS-1714807, CNS-2030501, CNS-2139358"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528558","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"119-124","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["BiasHacker: Voice Command Disruption by Exploiting Speaker Biases in Automatic Speech Recognition"],"prefix":"10.1145","author":[{"given":"Payton","family":"Walker","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Nathan","family":"McClaran","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Zihao","family":"Zheng","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]},{"given":"Guofei","family":"Gu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00014"},{"key":"e_1_3_2_1_2_1","volume-title":"Hidden Voice Commands. In USENIX Security Symposium.","author":"Carlini Nicholas","year":"2016","unstructured":"Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Michael E. Sherr , Clay Shields , David A. Wagner , and Wenchao Zhou . 2016 . Hidden Voice Commands. In USENIX Security Symposium. Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Michael E. Sherr, Clay Shields, David A. Wagner, and Wenchao Zhou. 2016. Hidden Voice Commands. In USENIX Security Symposium."},{"key":"e_1_3_2_1_3_1","volume-title":"Characterizing privacy perceptions of voice assistants: A technology probe study. arXiv preprint arXiv:1812.00263","author":"Chandrasekaran Varun","year":"2018","unstructured":"Varun Chandrasekaran , Kassem Fawaz , Bilge Mutlu , and Suman Banerjee . 2018. Characterizing privacy perceptions of voice assistants: A technology probe study. arXiv preprint arXiv:1812.00263 ( 2018 ). Varun Chandrasekaran, Kassem Fawaz, Bilge Mutlu, and Suman Banerjee. 2018. Characterizing privacy perceptions of voice assistants: A technology probe study. arXiv preprint arXiv:1812.00263 (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267357.3267359"},{"key":"e_1_3_2_1_5_1","volume-title":"Bence Mark Halpern, and Odette Scharenborg","author":"Feng Siyuan","year":"2021","unstructured":"Siyuan Feng , Olya Kudina , Bence Mark Halpern, and Odette Scharenborg . 2021 . Quantifying Bias in Automatic Speech Recognition. ArXiv abs\/2103.15122 (2021). Siyuan Feng, Olya Kudina, Bence Mark Halpern, and Odette Scharenborg. 2021. Quantifying Bias in Automatic Speech Recognition. ArXiv abs\/2103.15122 (2021)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3347449.3357480"},{"key":"e_1_3_2_1_7_1","unstructured":"Mahault Garnerin Solange Rossato and Laurent Besacier. 2020. Gender Representation in Open Source Speech Resources. In LREC.  Mahault Garnerin Solange Rossato and Laurent Besacier. 2020. Gender Representation in Open Source Speech Resources. In LREC."},{"key":"e_1_3_2_1_8_1","volume-title":"Schmidt","author":"Gorisch Jan","year":"2020","unstructured":"Jan Gorisch , Michael Gref , and Thomas C . Schmidt . 2020 . Using Automatic Speech Recognition in Spoken Corpus Curation. In LREC. Jan Gorisch, Michael Gref, and Thomas C. Schmidt. 2020. Using Automatic Speech Recognition in Spoken Corpus Curation. In LREC."},{"key":"e_1_3_2_1_9_1","volume-title":"Towards Measuring Fairness in Speech Recognition: Casual Conversations Dataset Transcriptions. ArXiv abs\/2111.09983","author":"Liu Chunxi","year":"2021","unstructured":"Chunxi Liu , Michael Picheny , Leda Sari , Pooja Chitkara , Alex Xiao , Xiaohui Zhang , Mark Chou , Andres Alvarado , Caner Hazirbas , and Yatharth Saraf . 2021. Towards Measuring Fairness in Speech Recognition: Casual Conversations Dataset Transcriptions. ArXiv abs\/2111.09983 ( 2021 ). Chunxi Liu, Michael Picheny, Leda Sari, Pooja Chitkara, Alex Xiao, Xiaohui Zhang, Mark Chou, Andres Alvarado, Caner Hazirbas, and Yatharth Saraf. 2021. Towards Measuring Fairness in Speech Recognition: Casual Conversations Dataset Transcriptions. ArXiv abs\/2111.09983 (2021)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445893"},{"key":"e_1_3_2_1_11_1","unstructured":"Cade Metz. 2020. There Is a Racial Divide in Speech-Recognition Systems Researchers Say. https:\/\/www.nytimes.com\/2020\/03\/23\/technology\/speechrecognition- bias-apple-amazon-google.html  Cade Metz. 2020. There Is a Racial Divide in Speech-Recognition Systems Researchers Say. https:\/\/www.nytimes.com\/2020\/03\/23\/technology\/speechrecognition- bias-apple-amazon-google.html"},{"key":"e_1_3_2_1_12_1","unstructured":"Josh Meyer Lindy Rauchenstein Joshua D. Eisenberg and Nicholas Howell. 2020. Artie Bias Corpus: An Open Dataset for Detecting Demographic Bias in Speech Applications. In LREC.  Josh Meyer Lindy Rauchenstein Joshua D. Eisenberg and Nicholas Howell. 2020. Artie Bias Corpus: An Open Dataset for Detecting Demographic Bias in Speech Applications. In LREC."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSA45270.2018.00026"},{"key":"e_1_3_2_1_14_1","unstructured":"Mishaela Robison. 2020. Voice assistants have a gender bias problem. What can we do about it? https:\/\/www.brookings.edu\/blog\/techtank\/2020\/12\/09\/voiceassistants- have-a-gender-bias-problem-what-can-we-do-about-it\/  Mishaela Robison. 2020. Voice assistants have a gender bias problem. What can we do about it? https:\/\/www.brookings.edu\/blog\/techtank\/2020\/12\/09\/voiceassistants- have-a-gender-bias-problem-what-can-we-do-about-it\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In USENIX Security Symposium.","author":"Sugawara Takeshi","year":"2020","unstructured":"Takeshi Sugawara , Benjamin Cyr , Sara Rampazzi , Daniel Genkin , and Kevin Fu . 2020 . Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In USENIX Security Symposium. Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. 2020. Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. In USENIX Security Symposium."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1746"},{"key":"e_1_3_2_1_17_1","volume-title":"Getting Gender Right in Neural Machine Translation. ArXiv abs\/1909.05088","author":"Vanmassenhove Eva","year":"2018","unstructured":"Eva Vanmassenhove , Christian Hardmeier , and Andy Way . 2018. Getting Gender Right in Neural Machine Translation. ArXiv abs\/1909.05088 ( 2018 ). Eva Vanmassenhove, Christian Hardmeier, and Andy Way. 2018. Getting Gender Right in Neural Machine Translation. ArXiv abs\/1909.05088 (2018)."},{"key":"e_1_3_2_1_18_1","unstructured":"Kyle Wiggers. 2021. Study finds that even the best speech recognition systems exhibit bias. https:\/\/venturebeat.com\/2021\/04\/01\/study-finds-that-even-thebest- speech-recognition-systems-exhibit-bias\/  Kyle Wiggers. 2021. Study finds that even the best speech recognition systems exhibit bias. https:\/\/venturebeat.com\/2021\/04\/01\/study-finds-that-even-thebest- speech-recognition-systems-exhibit-bias\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Qiben Yan Kehai Liu Qin Zhou Hanqing Guo and Ning Zhang. 2020. SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. In NDSS.  Qiben Yan Kehai Liu Qin Zhou Hanqing Guo and Ning Zhang. 2020. SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. In NDSS.","DOI":"10.14722\/ndss.2020.24068"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"}],"event":{"name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA","acronym":"WiSec '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528558","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3507657.3528558","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528558","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":20,"alternative-id":["10.1145\/3507657.3528558","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528558","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}