Natural mapping between voice commands and APIs
نویسندگان
چکیده
منابع مشابه
Inaudible Voice Commands
Voice assistants like Siri enable us to control IoT devices conveniently with voice commands, however, they also provide new attack opportunities for adversaries. Previous papers attack voice assistants with obfuscated voice commands by leveraging the gap between speech recognition system and human voice perception. The limitation is that these obfuscated commands are audible and thus conspicuo...
متن کاملHidden Voice Commands
Voice interfaces are becoming more ubiquitous and are now the primary input method for many devices. We explore in this paper how they can be attacked with hidden voice commands that are unintelligible to human listeners but which are interpreted as commands by devices. We evaluate these attacks under two different threat models. In the black-box model, an attacker uses the speech recognition s...
متن کاملEasyCmd: Navigation by Voice Commands
In this paper we present a system named EasyCmd that provides voice navigation on the desktop of Microsoft Window 9x system. Speech recognition engine for EasyCmd is much similar to that for dictation machine. Statistical Knowledge Based Frame Synchronous Search algorithm (SKBFSS) and Word Search Tree (WST) technologies are applied for acoustic decoding. Recognition Score Gap (RSG) is used for ...
متن کاملInterpreting voice commands in radar sys- tems
This master’s thesis is done in collaboration with SAAB and outlines an architecture for developing a voice command system with focus on supporting multiple languages, ease of introducing new domain knowledge, resource efficient and running in an offline environment. The solution and the decisions made along the process as well as their advantages and drawbacks are explained in this report. As ...
متن کاملInaudible Voice Commands: The Long-Range Attack and Defense
Recent work has shown that inaudible signals (at ultrasound frequencies) can be designed in a way that they become audible to microphones. Designed well, this can empower an adversary to stand on the road and silently control Amazon Echo and Google Home-like devices in people’s homes. A voice command like “Alexa, open the garage door” can be a serious threat. While recent work has demonstrated ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Open Computer Science
سال: 2021
ISSN: 2299-1093
DOI: 10.1515/comp-2020-0125