1 L. Zhang, "Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home" 377-386, 2020
2 M. Lindasalwa, "Voice recognition algorithms using mel frequency cepstral coefficient(MFCC)and dynamic time warping(DTW)techniques" 2 (2): 138-143, 2010
3 Bentley, Frank, "Understanding the long-term use of smart speaker assistants" 2 (2): 1-24, 2018
4 Z. Wang, "The era of silicon MEMS microphone and look beyond" 375-378, 2015
5 Johansson, M., "The Hilbert transform" Växjö University 1999
6 NIST, "National institute of standards and technology speaker recognition evaluation"
7 T. Fokkens, "Machine Learning Voice Synthesis for Intention Electromagnetic Interference Injection in Smart Speaker Devices" 673-677, 2021
8 Sugawara, T, "Light Commands:{Laser-Based} Audio Injection Attacks on {Voice-Controllable} Systems" 2631-2648, 2020
9 "Kakao mini hexa"
10 Roy, Nirupam, "Inaudible Voice Commands: The {Long-Range} Attack and Defense" 547-560, 2018
1 L. Zhang, "Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home" 377-386, 2020
2 M. Lindasalwa, "Voice recognition algorithms using mel frequency cepstral coefficient(MFCC)and dynamic time warping(DTW)techniques" 2 (2): 138-143, 2010
3 Bentley, Frank, "Understanding the long-term use of smart speaker assistants" 2 (2): 1-24, 2018
4 Z. Wang, "The era of silicon MEMS microphone and look beyond" 375-378, 2015
5 Johansson, M., "The Hilbert transform" Växjö University 1999
6 NIST, "National institute of standards and technology speaker recognition evaluation"
7 T. Fokkens, "Machine Learning Voice Synthesis for Intention Electromagnetic Interference Injection in Smart Speaker Devices" 673-677, 2021
8 Sugawara, T, "Light Commands:{Laser-Based} Audio Injection Attacks on {Voice-Controllable} Systems" 2631-2648, 2020
9 "Kakao mini hexa"
10 Roy, Nirupam, "Inaudible Voice Commands: The {Long-Range} Attack and Defense" 547-560, 2018
11 S. Debnath, "IEEE 9th International Conference on Intelligent Systems and Control(ISCO), pp" 1-7, 2015
12 "Google Home"
13 "GalaxyHome"
14 S. Godwin, "Future Security of Smart Speaker and IoT Smart Home Devices" 1-6, 2019
15 Zhang, Guoming, "Dolphinattack : Inaudible voice commands" 103-117, 2017
16 Sakamoto, M., "Average thresholds in the 8 to 20 kHz range as a function of age" 27 (27): 189-192, 1998
17 "Amazon Alexa"
18 H. Chung, "Alexa, Can I Trust You?" 50 (50): 100-104, 2017
19 Z. Wu, "A study on replay attack and anti-spoofing for text-dependent speaker verification" 1-5, 2014
20 R. N. Dean, "A Characterization of the Performance of a MEMS Gyroscope in Acoustically Harsh Environments" 58 (58): 2591-2596, 2011