ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2202.02585
  4. Cited By
GhostTalk: Interactive Attack on Smartphone Voice System Through Power
  Line

GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line

5 February 2022
Yuanda Wang
Hanqing Guo
Qiben Yan
    AAML
ArXivPDFHTML

Papers citing "GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line"

16 / 16 papers shown
Title
Sok: Comprehensive Security Overview, Challenges, and Future Directions
  of Voice-Controlled Systems
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems
Haozhe Xu
Cong Wu
Yangyang Gu
Xingcan Shang
Jing Chen
Kun He
Ruiying Du
60
3
0
27 May 2024
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Zihao Zhan
Yirui Yang
Haoqi Shan
Hanqiu Wang
Yier Jin
Shuo Wang
AAML
16
2
0
18 Feb 2024
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How
  Vulnerable are Commercial Voice Control Systems?
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Yuanda Wang
Qiben Yan
Nikolay Ivanov
Xun Chen
AAML
13
2
0
10 Dec 2023
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAML
SILM
68
3
0
20 Nov 2023
MASTERKEY: Practical Backdoor Attack Against Speaker Verification
  Systems
MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Hanqing Guo
Xun Chen
Junfeng Guo
Li Xiao
Qiben Yan
23
11
0
13 Sep 2023
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via
  Split-Second Phoneme Injection
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection
Hanqing Guo
Guangjing Wang
Yuanda Wang
Bocheng Chen
Qiben Yan
Li Xiao
AAML
37
9
0
13 Sep 2023
SkillScanner: Detecting Policy-Violating Voice Applications Through
  Static Analysis at the Development Phase
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase
Song Liao
Long Cheng
Haipeng Cai
Linke Guo
Hongxin Hu
ELM
29
5
0
11 Sep 2023
Compensating Removed Frequency Components: Thwarting Voice Spectrum
  Reduction Attacks
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
Shu Wang
Kun Sun
Qi Li
AAML
33
0
0
18 Aug 2023
Inaudible Adversarial Perturbation: Manipulating the Recognition of User
  Speech in Real Time
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Xinfeng Li
Chen Yan
Xuancun Lu
Zihan Zeng
Xiaoyu Ji
Wenyuan Xu
AAML
40
8
0
02 Aug 2023
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via
  Adversarial Ultrasound
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Xinfeng Li
Junning Ze
Chen Yan
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
AAML
31
11
0
28 Jun 2023
VSMask: Defending Against Voice Synthesis Attack via Real-Time
  Predictive Perturbation
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Yuanda Wang
Hanqing Guo
Guangjing Wang
Bocheng Chen
Qiben Yan
AAML
33
17
0
09 May 2023
NUANCE: Near Ultrasound Attack On Networked Communication Environments
NUANCE: Near Ultrasound Attack On Networked Communication Environments
Forrest McKee
David Noever
AAML
217
2
0
25 Apr 2023
EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on
  Smartphones
EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones
Quancheng Wang
Ming Tang
Jianming Fu
AAML
21
3
0
07 Mar 2023
Electromagnetic Signal Injection Attacks on Differential Signaling
Electromagnetic Signal Injection Attacks on Differential Signaling
Youqian Zhang
Kasper Bonne Rasmussen
AAML
35
5
0
31 Jul 2022
Towards Adversarial Control Loops in Sensor Attacks: A Case Study to
  Control the Kinematics and Actuation of Embedded Systems
Towards Adversarial Control Loops in Sensor Attacks: A Case Study to Control the Kinematics and Actuation of Embedded Systems
Yazhou Tu
Sara Rampazzi
X. Hei
AAML
22
1
0
15 Mar 2022
Detection of Electromagnetic Signal Injection Attacks on Actuator
  Systems
Detection of Electromagnetic Signal Injection Attacks on Actuator Systems
Youqian Zhang
Kasper Bonne Rasmussen
19
8
0
14 Mar 2022
1