Computer Sciences

How voice assistants follow inaudible commands

An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.

Internet

Smart software for smart devices

Almost everywhere one turns, one sees someone using a smartphone or other mobile, internet-connected device. Commonly, usage of such devices is not to make and receive phone calls as one might expect but the use of countless ...

page 2 from 2