DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E...
详细信息
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). Eliminating DolphinAttacks is challenging if ever possible since it requires to modify the microphone hardware. In this paper, we design EarArray, a lightweight method that can not only detect such attacks but also identify the direction of attackers without requiring any extra hardware or hardware modification. Essentially, inaudible voice commands are modulated on ultrasounds that inherently attenuate faster than the one of audible sounds. By inspecting the command sound signals via the built-in multiple microphones on smart devices, EarArray is able to estimate the attenuation rate and thus detect the attacks. We propose a model of the propagation of audible sounds and ultrasounds from the sound source to a voice assistant, e.g., a smart speaker, and illustrate the underlying principle and its feasibility. We implemented EarArray using two specially-designed microphone arrays and our experiments show that EarArray can detect inaudible voice commands with an accuracy of above 99% and recognize the direction of the attackers with an accuracy of 97.89% and can also detect the laser-based attack with an accuracy of 100%. IEEE
5G connected autonomous vehicles (CAVs) help enhance perception of driving environment and cooperation among vehicles by sharing sensing and driving information, which is a promising technology to avoid accidents and ...
详细信息
Lip Reading AI is a discipline that is rapidly changing and has numerous applications in security, accessibility and human-computer interaction. This paper proposes a model which combines Convolutional Neural Networks...
详细信息
Wildfires pose a great threat to human safety and property arising from both natural and human causes. According to a technical assessment by the Forest Survey of India more than 95% of fires are of anthropogenic orig...
详细信息
In the digital age,non-touch communication technologies are reshaping human-device interactions and raising security concerns.A major challenge in current technology is the misinterpretation of gestures by sensors and...
详细信息
In the digital age,non-touch communication technologies are reshaping human-device interactions and raising security concerns.A major challenge in current technology is the misinterpretation of gestures by sensors and cameras,often caused by environmental *** issue has spurred the need for advanced data processing methods to achieve more accurate gesture recognition and *** study presents a novel virtual keyboard allowing character input via distinct hand gestures,focusing on two key aspects:hand gesture recognition and character input *** developed a novel model with LSTM and fully connected layers for enhanced sequential data processing and hand gesture *** also integrated CNN,max-pooling,and dropout layers for improved spatial feature *** model architecture processes both temporal and spatial aspects of hand gestures,using LSTM to extract complex patterns from frame sequences for a comprehensive understanding of input *** unique dataset,essential for training the model,includes 1,662 landmarks from dynamic hand gestures,33 postures,and 468 face landmarks,all captured in real-time using advanced pose *** model demonstrated high accuracy,achieving 98.52%in hand gesture recognition and over 97%in character input across different *** excellent performance in real-time testing underlines its practicality and effectiveness,marking a significant advancement in enhancing human-device interactions in the digital age.
In recent years, there has been a rise in work which focuses on various issues of recommender systems other than accuracy. Popularity bias is one factor that causes the list of recommendations to deviate from the user...
详细信息
Federated Learning (FL) is a promising privacy-aware distributed learning framework that can be deployed on various devices, such as mobile phones, desktops, and devices equipped with CPUs or GPUs. In the context of s...
详细信息
—Spatial optimization problems (SOPs) refer to a class of problems where the decision variables require spatial organization. Existing methods based on evolutionary algorithms (EAs) fit conventional evolutionary oper...
详细信息
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** ...
详细信息
Videos represent the most prevailing form of digital media for communication,information dissemination,and ***,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant *** response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital *** study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be *** then investigates current developments in the field of video security by exploring two critical research ***,it examine the techniques used by adversaries to compromise video data and evaluate their *** these attack methodologies is crucial for developing effective defense ***,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and *** compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease ***,it identifies potential research opportunities to enhance video data protection in response to the evolving threat *** this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false...
详细信息
暂无评论