1. B. U. Mahmud and A. Sharmin , " Deep insights of deepfake technology: A review," arXiv preprint arXiv:2105.00192 , 2021 . B. U. Mahmud and A. Sharmin, "Deep insights of deepfake technology: A review," arXiv preprint arXiv:2105.00192, 2021.
2. " Amazon's alexa impersonates grandma , creeping out internet," https://www.bloomberg.com/news/articles/2022-06--23/amazon-s-alexaimpersonates- grandma-creeping-out-the-internet , June 23 , 2022 . "Amazon's alexa impersonates grandma, creeping out internet," https://www.bloomberg.com/news/articles/2022-06--23/amazon-s-alexaimpersonates- grandma-creeping-out-the-internet, June 23, 2022.
3. " Voice guidance & navigation," https://www.readspeaker.ai/applications/voiceguidance- and-navigation/ , Accessed on August 15, 2022 . "Voice guidance & navigation," https://www.readspeaker.ai/applications/voiceguidance- and-navigation/, Accessed on August 15, 2022.
4. "Voiceprint : The new wechat password," https://blog.wechat.com/2015/05/21/vo iceprint-the-new-wechat-password/ , May 21 , 2015 . "Voiceprint: The new wechat password," https://blog.wechat.com/2015/05/21/vo iceprint-the-new-wechat-password/, May 21, 2015.
5. Y. Wang , H. Guo , and Q. Yan , " Ghosttalk: Interactive attack on smartphone voice system through power line," in Network and Distributed Systems Security (NDSS) Symposium , 2022 . Y. Wang, H. Guo, and Q. Yan, "Ghosttalk: Interactive attack on smartphone voice system through power line," in Network and Distributed Systems Security (NDSS) Symposium, 2022.