“…Thus, in this section, we do not discuss adversarial attacks and defenses that focus on speech recognition [34], [60], [65], [81], [82], [83], [84], [85], [86], [87] (cf. [63], [80] for survey). There are other voice attacks in the speaker recognition domain, such as hidden voice attacks [78] and spoofing attacks [79], [88], [89], [90], [91], [92].…”