Power BI Fundamentals - Create visualizations and dashboards from scratch
Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the vulnerabilities in Automatic Speech Recognition (ASR) and Speaker Identification Systems in this 15-minute IEEE conference presentation. Gain insights into various attack methods, evaluation metrics, and mediums used to exploit these systems. Delve into the concept of knowledge transferability and examine real-world experiments that demonstrate the potential risks. Learn why a Systematization of Knowledge (SoK) approach is crucial for understanding and addressing these security challenges in voice-based technologies.
Syllabus
Introduction
Attack
Why SoK
Overview
Attacks
Metrics
Mediums
Knowledge
Target Transferability
Experiments
Taught by
IEEE Symposium on Security and Privacy