{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:40Z","timestamp":1773615640616,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s014641162570097x","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:33:17Z","timestamp":1771936397000},"page":"1415-1425","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Countering Illegitimate Activations of a Smart Voice Assistant"],"prefix":"10.3103","volume":"59","author":[{"given":"M. A.","family":"Poltavtseva","sequence":"first","affiliation":[]},{"given":"A. V.","family":"Bolokan","sequence":"additional","affiliation":[]},{"given":"P. V.","family":"Semyanov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7932_CR1","doi-asserted-by":"publisher","unstructured":"Sugawara, T., Cyr, B., Rampazzi, S., Genkin, D., and Fu, K., Light commands: Laser-based audio injection attacks on voice-controllable systems, arXiv Preprint, 2020. https:\/\/doi.org\/10.48550\/arXiv.2006.11946","DOI":"10.48550\/arXiv.2006.11946"},{"key":"7932_CR2","doi-asserted-by":"publisher","unstructured":"Zhang, G., Yan, Ch., Ji, X., Zhang, T., Zhang, T., and Xu, W., DolphinAttack: Inaudible voice commands, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), Dallas, TX, 2017, New York: Association for Computing Machinery, 2017, pp. 103\u2013117. https:\/\/doi.org\/10.1145\/3133956.3134052","DOI":"10.1145\/3133956.3134052"},{"key":"7932_CR3","unstructured":"How Alice works. Yandex lecture. https:\/\/habr.com\/ru\/company\/yandex\/blog\/349372. Cited September 28, 2024."},{"key":"7932_CR4","first-page":"423","volume":"2","author":"R.F. Faizulin","year":"2021","unstructured":"Faizulin, R.F. and Demichev, M.S., Taking control of the virtual assistants by using ulrasonic attacks, Aktual\u2019nye problemy aviatsii i kosmonavtiki (Topical Problems of Aviation and Cosmonautics), Krasnoyarsk, 2021, Krasnoyarsk: Sibirskii Gosudarstvennyi Universitet Nauki i Tekhnologii imeni Akademika M.F. Reshetneva, 2021, vol. 2, pp. 423\u2013426.","journal-title":"Reshetneva"},{"key":"7932_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.18413\/2518-1092-2022-7-1-0-4","volume":"7","author":"V.M. Gerasimov","year":"2022","unstructured":"Gerasimov, V.M. and Maslova, M.A., Possible threats and attacks on the user voice identification system, Nauchnyi Rezul\u2019tat. \n               Informatsionnye Tekhnologii, 2022, vol. 7, no. 1, pp. 32\u201337. https:\/\/doi.org\/10.18413\/2518-1092-2022-7-1-0-4","journal-title":"Informatsionnye Tekhnologii"},{"key":"7932_CR6","doi-asserted-by":"publisher","unstructured":"Malik, H., Securing voice-driven interfaces against fake (cloned) audio attacks, 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), San Jose, CA, 2019, IEEE, 2019. https:\/\/doi.org\/10.1109\/mipr.2019.00104","DOI":"10.1109\/mipr.2019.00104"},{"key":"7932_CR7","doi-asserted-by":"publisher","unstructured":"Chen, S., Ren, K., Piao, S., Wang, C., Wang, Q., Weng, J., Su, L., and Mohaisen, A., You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, 2017, IEEE, 2017, pp. 183\u2013195. https:\/\/doi.org\/10.1109\/ICDCS.2017.133","DOI":"10.1109\/ICDCS.2017.133"},{"key":"7932_CR8","doi-asserted-by":"publisher","first-page":"255","DOI":"10.2478\/popets-2020-0072","volume":"2020","author":"D.J. Dubois","year":"2020","unstructured":"Dubois, D.J., Kolcun, R., Mandalari, A.M., Paracha, M.T., Choffnes, D., and Haddadi, H., When speakers are all ears: Characterizing misactivations of IoT smart speakers, Proceedings on Privacy Enhancing Technologies, 2020, vol. 2020, no. 4, pp. 255\u2013276. https:\/\/doi.org\/10.2478\/popets-2020-0072","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"7932_CR9","doi-asserted-by":"publisher","unstructured":"Lau, Ye.W., Wagner, M., and Tran, D., Vulnerability of speaker verification to voice mimicking, Proceedings of 2004 International Symposium on Intelligent Multimedia, Video and Speech Processing, \n               2004, Hong Kong, 2004, IEEE, 2004, pp. 145\u2013148. https:\/\/doi.org\/10.1109\/ISIMP.2004.1434021","DOI":"10.1109\/ISIMP.2004.1434021"},{"key":"7932_CR10","unstructured":"Berlin, S.I., Batori, G.A., and Kopylova, D.V., Biometrics in the banking sector. Research into the safety of biometric data storage, Vestnik Akademii Znanii, 2019, no. 3, pp. 329\u2013336."},{"key":"7932_CR11","doi-asserted-by":"publisher","first-page":"387","DOI":"10.3103\/s0146411619050067","volume":"53","author":"D.S. Lavrova","year":"2019","unstructured":"Lavrova, D.S., Zaitseva, E.A., and Zegzhda, D.P., Approach to presenting network infrastructure of cyberphysical systems to minimize the cyberattack neutralization time, Autom. Control Comput. Sci., 2019, vol. 53, no. 5, pp. 387\u2013392. https:\/\/doi.org\/10.3103\/s0146411619050067","journal-title":"Autom. Control Comput. Sci."},{"key":"7932_CR12","doi-asserted-by":"publisher","unstructured":"Shchemelinin, V., Topchina, M., and Simonchik, K., Vulnerability of voice verification systems to spoofing attacks by TTS voices based on automatically labeled telephone speech, Speech and Computer. SPECOM 2014, Ronzhin, A., Potapova, R., and Delic, V., Eds., Lecture Notes in Computer Science, vol. 8773, Cham: Springer, 2014, pp. 475\u2013481. https:\/\/doi.org\/10.1007\/978-3-319-11581-8_59","DOI":"10.1007\/978-3-319-11581-8_59"},{"key":"7932_CR13","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.sd.2024.12345","volume":"12","author":"L. Brown","year":"2024","unstructured":"Brown, L. and Smith, J., Voice deepfake detection techniques: A survey, ScienceDirect, 2024, vol. 12, pp. 456\u2013472. https:\/\/doi.org\/10.1016\/j.sd.2024.12345","journal-title":"ScienceDirect"},{"key":"7932_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.32628\/ijsrst2411581","volume":"11","author":"P. Jain","year":"2024","unstructured":"Jain, P., Ujjainia, P., Srivastava, A., Shrivastav, K., Rani, I., Vashisht, A., Behera, R., Moza, B., and Mukherjee, D., Forensic perspective on voice biometrics and AI: A review, International Journal of Scientific Research in Science and Technology, 2024, vol. 11, no. 5, pp. 49\u201363. https:\/\/doi.org\/10.32628\/ijsrst2411581","journal-title":"International Journal of Scientific Research in Science and Technology"},{"key":"7932_CR15","first-page":"284","volume":"17","author":"V.V. Platonov","year":"2014","unstructured":"Platonov, V.V. and Semenov, P.O., Dimension reduction in network attacks detection systems, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 284\u2013289.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7932_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.17586\/2226-1494-2021-21-1-109-117","volume":"21","author":"A.Yu. Kuznetsov","year":"2021","unstructured":"Kuznetsov, A.Yu., Murtazin, R.A., Garipov, I.M., Fedorov, E.A., Kholodenina, A.V., and Vorobeva, A.A., Methods of countering speech synthesis attacks on voice biometric systems in banking, Nauchn.-Tekh. Vestn. Inf. Tekhnol., \n               Mekh. Opt., 2021, vol. 21, no. 1, pp. 109\u2013117. https:\/\/doi.org\/10.17586\/2226-1494-2021-21-1-109-117","journal-title":"Mekh. Opt."},{"key":"7932_CR17","first-page":"189","volume":"10","author":"A. Duha","year":"2023","unstructured":"Duha, A. and Laheeb, I., A comprehensive survey on deepfake detection techniques, International Journal of Intelligent Systems and Applications in Engineering, 2023, vol. 10, no. 3, pp. 189\u2013200.","journal-title":"International Journal of Intelligent Systems and Applications in Engineering"},{"key":"7932_CR18","doi-asserted-by":"publisher","first-page":"2996","DOI":"10.1109\/tdsc.2020.2973620","volume":"18","author":"Ya. Meng","year":"2021","unstructured":"Meng, Ya., Zhu, H., Li, J., Li, J., and Liu, Ya., Liveness detection for voice user interface via wireless signals in IoT environment, IEEE Trans. Dependable Secure Comput., 2021, vol. 18, no. 6, pp. 2996\u20133011. https:\/\/doi.org\/10.1109\/tdsc.2020.2973620","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7932_CR19","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.3103\/s0146411619080133","volume":"53","author":"D.S. Lavrova","year":"2019","unstructured":"Lavrova, D.S., Forecasting the state of components of smart grids for early detection of cyberattacks, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1023\u20131025. https:\/\/doi.org\/10.3103\/s0146411619080133","journal-title":"Autom. Control Comput. Sci."},{"key":"7932_CR20","unstructured":"Evsyukov, M.V., Putyato, M.M., Makaryan, A.S., and Nemchinova, V.O., Protection methods in modern voice authentication systems, Prikaspiiskii Zhurnal: Upravlenie i Vysokie Tekhnologii, 2022, no. 3, pp. 84\u201392."},{"key":"7932_CR21","doi-asserted-by":"publisher","unstructured":"Yang, Q., Cui, K., and Zheng, Yu., VoShield: Voice liveness detection with sound field dynamics, IEEE INFOCOM 2023\u2014IEEE Conference on Computer Communications, New York, 2023, IEEE, 2023, pp. 1\u201310. https:\/\/doi.org\/10.1109\/infocom53939.2023.10229038","DOI":"10.1109\/infocom53939.2023.10229038"},{"key":"7932_CR22","doi-asserted-by":"publisher","unstructured":"Kalinin, M. and Konoplev, A., Prevention of selfish mining attacks in blockchain-enabled smart city networks, 2025 International Russian Smart Industry Conference (SmartIndustryCon), Sochi, Krasnodar krai, 2025, IEEE, 2025, pp. 494\u2013499. https:\/\/doi.org\/10.1109\/smartindustrycon65166.2025.10986235","DOI":"10.1109\/smartindustrycon65166.2025.10986235"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162570097X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641162570097X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641162570097X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:39Z","timestamp":1773612159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641162570097X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7932"],"URL":"https:\/\/doi.org\/10.3103\/s014641162570097x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"11 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}