ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.11946
  4. Cited By
Light Commands: Laser-Based Audio Injection Attacks on
  Voice-Controllable Systems

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems

22 June 2020
Takeshi Sugawara
Benjamin Cyr
Sara Rampazzi
Daniel Genkin
Kevin Fu
    AAML
ArXivPDFHTML

Papers citing "Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems"

9 / 9 papers shown
Title
Threat Me Right: A Human HARMS Threat Model for Technical Systems
Threat Me Right: A Human HARMS Threat Model for Technical Systems
K. Turk
Anna Talas
Alice Hutchings
55
0
0
10 Feb 2025
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
106
3
0
20 Nov 2023
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous
  Driving
Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving
Yulong Cao
Chaowei Xiao
Benjamin Cyr
Yimeng Zhou
Wonseok Park
Sara Rampazzi
Qi Alfred Chen
Kevin Fu
Z. Morley Mao
AAML
47
536
0
16 Jul 2019
Understanding and Mitigating the Security Risks of Voice-Controlled
  Third-Party Skills on Amazon Alexa and Google Home
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
Yi Yu
Xianghang Mi
Xuan Feng
Xiaofeng Wang
Yuan Tian
Feng Qian
28
74
0
03 May 2018
CommanderSong: A Systematic Approach for Practical Adversarial Voice
  Recognition
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Xuejing Yuan
Yuxuan Chen
Yue Zhao
Yunhui Long
Xiaokang Liu
Kai Chen
Shengzhi Zhang
Heqing Huang
Xiaofeng Wang
Carl A. Gunter
AAML
66
353
0
24 Jan 2018
DolphinAtack: Inaudible Voice Commands
DolphinAtack: Inaudible Voice Commands
Guoming Zhang
Chen Yan
Xiaoyu Ji
Taimin Zhang
Tianchen Zhang
Wenyuan Xu
AAML
43
694
0
31 Aug 2017
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
A. Sikder
Hidayet Aksu
A. S. Uluagac
AAML
76
122
0
30 Jun 2017
Continuous Authentication for Voice Assistants
Continuous Authentication for Voice Assistants
Huan Feng
Kassem Fawaz
Kang G. Shin
AAML
59
268
0
17 Jan 2017
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information
  and Control Your Phone
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
Wenrui Diao
Xiangyu Liu
Zhe Zhou
Kehuan Zhang
55
157
0
18 Jul 2014
1