{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T11:03:57Z","timestamp":1772363037273,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690305","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"4867-4881","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Blind and Low-Vision Individuals' Detection of Audio Deepfakes"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3058-7255","authenticated-orcid":false,"given":"Filipo","family":"Sharevski","sequence":"first","affiliation":[{"name":"DePaul University, Chicago, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9334-8660","authenticated-orcid":false,"given":"Aziz","family":"Zeidieh","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Urbana-Champaign, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1333-9968","authenticated-orcid":false,"given":"Jennifer Vander","family":"Loop","sequence":"additional","affiliation":[{"name":"DePaul University, Chicago, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9238-6710","authenticated-orcid":false,"given":"Peter","family":"Jachim","sequence":"additional","affiliation":[{"name":"DePaul University, Chicago, Illinois, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"meet the real me: Voice synthesis attacks on voice assistants. Computers & Security","volume":"137","author":"Bilika Domna","year":"2024","unstructured":"Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, and Constantinos Patsakis. 2024. Hello me, meet the real me: Voice synthesis attacks on voice assistants. Computers & Security, Vol. 137 (2024), 103617."},{"key":"e_1_3_2_1_2_1","volume-title":"Detecting Audio DeepFakes Through Vocal Tract Reconstruction. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Blue Logan","year":"2022","unstructured":"Logan Blue, Kevin Warren, Hadi Abdullah, Cassidy Gibson, Luis Vargas, Jessica OtextquoterightDell, Kevin Butler, and Patrick Traynor. 2022. Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 2691--2708. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/blue"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-021-00116-3"},{"key":"e_1_3_2_1_4_1","first-page":"147","article-title":"Deepfakes and the new disinformation war: The coming age of post-truth geopolitics","volume":"98","author":"Chesney Robert","year":"2019","unstructured":"Robert Chesney and Danielle Citron. 2019. Deepfakes and the new disinformation war: The coming age of post-truth geopolitics. Foreign Aff., Vol. 98 (2019), 147.","journal-title":"Foreign Aff."},{"key":"e_1_3_2_1_5_1","unstructured":"Cybersecurity and Infrastrucure Security Agency (CISA). 2021. Avoiding Social Engineering and Phishing Attacks. https:\/\/www.cisa.gov\/news-events\/news\/avoiding-social-engineering-and-phishing-attacks."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13347-021-00459-2"},{"key":"e_1_3_2_1_7_1","unstructured":"Eleven Labs. 2023. Generative Voice AI. https:\/\/elevenlabs.io."},{"key":"e_1_3_2_1_8_1","unstructured":"Federal Communication Commission. 2024. Chatbots deepfakes and voice clones: AI deception for sale. https:\/\/www.ftc.gov\/business-guidance\/blog\/2023\/03\/chatbots-deepfakes-voice-clones-ai-deception-sale"},{"key":"e_1_3_2_1_9_1","unstructured":"Federal Communication Commission. 2024. Implications of Artificial Intelligence Technologies on Protecting Consumers from Unwanted Robocalls and Robotexts. https:\/\/docs.fcc.gov\/public\/attachments\/FCC-24--17A1.pdf"},{"key":"e_1_3_2_1_10_1","volume-title":"Statistical methods for rates and proportions","author":"Fleiss Joseph L","unstructured":"Joseph L Fleiss, Bruce Levin, and Myunghee Cho Paik. 2013. Statistical methods for rates and proportions. John Wiley & Sons."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00159"},{"key":"e_1_3_2_1_12_1","volume-title":"Wavefake: A data set to facilitate audio deepfake detection. arXiv preprint arXiv:2111.02813","author":"Frank Joel","year":"2021","unstructured":"Joel Frank and Lea Sch\u00f6nherr. 2021. Wavefake: A data set to facilitate audio deepfake detection. arXiv preprint arXiv:2111.02813 (2021)."},{"key":"e_1_3_2_1_13_1","first-page":"38","article-title":"Surfing by ear: Usability concerns of computer users who are blind or visually impaired","volume":"3","author":"Gerber Elaine","year":"2002","unstructured":"Elaine Gerber. 2002. Surfing by ear: Usability concerns of computer users who are blind or visually impaired. Access World, Vol. 3, 1 (2002), 38--43.","journal-title":"Access World"},{"key":"e_1_3_2_1_14_1","volume-title":"Speech and audio signal processing: processing and perception of speech and music","author":"Gold Ben","unstructured":"Ben Gold, Nelson Morgan, and Dan Ellis. 2011. Speech and audio signal processing: processing and perception of speech and music. John Wiley & Sons."},{"key":"e_1_3_2_1_15_1","volume-title":"Human detection of political deepfakes across transcripts, audio, and video. arXiv preprint arXiv:2202.12883","author":"Groh Matthew","year":"2022","unstructured":"Matthew Groh, Aruna Sankaranarayanan, and Rosalind Picard. 2022. Human detection of political deepfakes across transcripts, audio, and video. arXiv preprint arXiv:2202.12883 (2022)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642817"},{"key":"e_1_3_2_1_17_1","volume-title":"European Conference on Educational Research.","author":"Hayhoe Simon","year":"2000","unstructured":"Simon Hayhoe and Azizah Rajab. 2000. Ethical considerations of conducting ethnographic research in visually impaired communities. In European Conference on Educational Research."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10448134"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179374"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Hideki Kawahara Ikuyo Masuda-Katsuse and Alain De Cheveigne. 1999. Restructuring speech representations using a pitch-adaptive time--frequency smoothing and an instantaneous-frequency-based F0 extraction: Possible role of a repetitive structure in sounds. Speech communication Vol. 27 3--4 (1999) 187--207.","DOI":"10.1016\/S0167-6393(98)00085-5"},{"key":"e_1_3_2_1_21_1","volume-title":"Woo","author":"Khalid Hasam","year":"2021","unstructured":"Hasam Khalid, Shahroz Tariq, Minha Kim, and Simon S. Woo. 2021. FakeAVCeleb: A Novel Audio-Video Multimodal Deepfake Dataset. In Thirty-fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 2). https:\/\/openreview.net\/forum?id=TAXFsg6ZaOl"},{"key":"e_1_3_2_1_22_1","unstructured":"LastPass. 2024. Attempted Audio Deepfake Call Targets LastPass Employee. https:\/\/blog.lastpass.com\/posts\/2024\/04\/attempted-audio-deepfake-call-targets-lastpass-employee"},{"key":"e_1_3_2_1_23_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Lau Elaine","year":"2023","unstructured":"Elaine Lau and Zachary Peterson. 2023. A Research Framework and Initial Study of Browser Security for the Visually Impaired. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 4679--4696. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/lau"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2023.3285283"},{"key":"e_1_3_2_1_25_1","volume-title":"Griffin","author":"Mai Kimberly T.","year":"2023","unstructured":"Kimberly T. Mai, Sergi Bray, Toby Davies, and Lewis D. Griffin. 2023. Warning: Humans cannot reliably detect speech deepfakes. PLOS ONE, Vol. 18, 8 (08 2023), e0285333--."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660175"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3552466.3556531"},{"key":"e_1_3_2_1_28_1","unstructured":"Margi Murphy Rachel Metz and Mark Bergen. 2024. AI Startup ElevenLabs Bans Account Blamed for Biden Audio Deepfake. https:\/\/www.bloomberg.com\/news\/articles\/2024-01--26\/ai-startup-elevenlabs-bans-account-blamed-for-biden-audio-deepfake"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3059479"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/1468794112446106"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386867"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2021.102604"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607505.3607525"},{"key":"e_1_3_2_1_34_1","volume-title":"Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision Users in Realistic Settings. In 33st USENIX Security Symposium (USENIX Security 24)","author":"Sharevski Filipo","year":"2024","unstructured":"Filipo Sharevski and Aziz Zeidieh. 2024. Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision Users in Realistic Settings. In 33st USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, MA, 2691--2708. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/sharevski"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690305"},{"key":"e_1_3_2_1_36_1","unstructured":"Verizon. 2023. Data Breach Investigations Report. Technical Report. Verizon. https:\/\/www.verizon.com\/business\/resources\/Tabb\/reports\/2023-data-breach-investigations-report-dbir.pdf Retrieved August 31 2023 from"},{"key":"e_1_3_2_1_37_1","unstructured":"Elliott Vittoria and Kelly Makena. 2024. The Biden Deepfake Robocall Is Only the Beginning. https:\/\/www.wired.com\/story\/biden-robocall-deepfake-danger\/"},{"key":"e_1_3_2_1_38_1","unstructured":"Web Accessibility Initiative (WAI). 2022. Making Audio and Video Media Accessible. https:\/\/www.w3.org\/WAI\/media\/av\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Junichi Yamagishi Christophe Veaux Kirsten MacDonald et al. 2019. Cstr vctk corpus: English multi-speaker corpus for cstr voice cloning toolkit (version 0.92). (2019). https:\/\/datashare.ed.ac.uk\/handle\/10283\/3443."},{"key":"e_1_3_2_1_40_1","volume-title":"compact, and high quality LSTM-RNN based statistical parametric speech synthesizers for mobile devices. arXiv preprint arXiv:1606.06061","author":"Zen Heiga","year":"2016","unstructured":"Heiga Zen, Yannis Agiomyrgiannakis, Niels Egberts, Fergus Henderson, and Przemys\u0142aw Szczepaniak. 2016. Fast, compact, and high quality LSTM-RNN based statistical parametric speech synthesizers for mobile devices. arXiv preprint arXiv:1606.06061 (2016)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:13:21Z","timestamp":1755843201000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":40,"alternative-id":["10.1145\/3658644.3690305","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690305","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}