How voice assistants follow inaudible commands
An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.
Oct 23, 2019
0
98
Computer Sciences
An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.
Oct 23, 2019
0
98
Hi Tech & Innovation
Biometric authentication has frequently made the news—without even knowing any formal definition, we are used to the headlines and the stories about how fingers or eyes can be the keys to gain access to sites and doors, ...
Mar 09, 2016 weblog
0
5