Subject
Human-Computer Interaction,Theoretical Computer Science,Software
Reference76 articles.
1. 50 Years of biometric research: Accomplishments, challenges, and opportunities;Jain;Pattern Recog. Lett.,2016
2. Diao, W., Liu, X., Zhou, Z., Zhang, K., 2014. Your voice assistant is mine: How to abuse speakers to steal information and control your phone. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, Scottsdale, Arizona, USA. pp. 63–74.
3. Speaker recognition anti-spoofing;Evans,2014
4. HandBook of Biometric Anti-Spoofing. Vol. 1;Marcel,2014
5. Patil, H.A., Kamble, M.R., 2018. A survey on replay attack detection for automatic speaker verification (ASV) system. In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. APSIPA ASC, Honolulu, Hawaii, USA, pp. 1047–1053.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献