2022
DOI: 10.1007/978-3-031-21333-5_41
|View full text |Cite
|
Sign up to set email alerts
|

Alexa, Do What I Want To. Implementing a Voice Spoofing Attack Tool for Virtual Voice Assistants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
0
0
Order By: Relevance
“…Other error measures such as Character Error Rate (CER), Match Error Rate (MER), Word Information Lost (WIL), and Word Information Preserved (WIP) are also included in the datasets. The data are divided based on the tool used, i.e., Alexa, Whisper Base, or Whisper Large-v2, and within these categories, the data is further divided by gender and accent [41]. Lost (WIL), and Word Information Preserved (WIP) are also included in the datasets.…”
Section: Resultsmentioning
confidence: 99%
“…Other error measures such as Character Error Rate (CER), Match Error Rate (MER), Word Information Lost (WIL), and Word Information Preserved (WIP) are also included in the datasets. The data are divided based on the tool used, i.e., Alexa, Whisper Base, or Whisper Large-v2, and within these categories, the data is further divided by gender and accent [41]. Lost (WIL), and Word Information Preserved (WIP) are also included in the datasets.…”
Section: Resultsmentioning
confidence: 99%