ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.11946
  4. Cited By
Light Commands: Laser-Based Audio Injection Attacks on
  Voice-Controllable Systems

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems

22 June 2020
Takeshi Sugawara
Benjamin Cyr
Sara Rampazzi
Daniel Genkin
Kevin Fu
    AAML
ArXiv (abs)PDFHTML

Papers citing "Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems"

27 / 27 papers shown
Title
Physical-Layer Signal Injection Attacks on EV Charging Ports: Bypassing Authentication via Electrical-Level Exploits
Physical-Layer Signal Injection Attacks on EV Charging Ports: Bypassing Authentication via Electrical-Level Exploits
Hetian Shi
Yi He
Shangru Song
Jianwei Zhuge
Jian Mao
12
0
0
19 Jun 2025
Threat Me Right: A Human HARMS Threat Model for Technical Systems
Threat Me Right: A Human HARMS Threat Model for Technical Systems
K. Turk
Anna Talas
Alice Hutchings
65
0
0
10 Feb 2025
AntibotV: A Multilevel Behaviour-based Framework for Botnets Detection
  in Vehicular Networks
AntibotV: A Multilevel Behaviour-based Framework for Botnets Detection in Vehicular Networks
Rabah Rahal
Abdelaziz Amara Korba
Nacira Ghoualmi-Zine
Y. Challal
Mohamed Yacine Ghamri-Doudane
44
10
0
03 Jul 2024
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Guangjing Wang
Ce Zhou
Yuanda Wang
Bocheng Chen
Hanqing Guo
Qiben Yan
AAMLSILM
135
3
0
20 Nov 2023
Compensating Removed Frequency Components: Thwarting Voice Spectrum
  Reduction Attacks
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
Shu Wang
Kun Sun
Qi Li
AAML
55
0
0
18 Aug 2023
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via
  Adversarial Ultrasound
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound
Xinfeng Li
Junning Ze
Chen Yan
Yushi Cheng
Xiaoyu Ji
Wenyuan Xu
AAML
68
12
0
28 Jun 2023
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced
  Driver-Assistance System
Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System
Jiwei Guan
Lei Pan
Chen Wang
Shui Yu
Longxiang Gao
Xi Zheng
AAML
56
4
0
30 May 2023
Assault and Battery: Evaluating the Security of Power Conversion Systems
  Against Electromagnetic Injection Attacks
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks
Marcell Szakály
S. Köhler
Martin Strohmeier
Ivan Martinovic
60
4
0
11 May 2023
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks
  through Physical Barriers
BarrierBypass: Out-of-Sight Clean Voice Command Injection Attacks through Physical Barriers
Pa Walker
Tianfang Zhang
Cong Shi
Nitesh Saxena
Ying-Cong Chen
AAML
85
2
0
04 Feb 2023
Side Auth: Synthesizing Virtual Sensors for Authentication
Side Auth: Synthesizing Virtual Sensors for Authentication
Yan Long
Kevin Fu
AAML
45
1
0
27 Jan 2023
SkillFence: A Systems Approach to Practically Mitigating Voice-Based
  Confusion Attacks
SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks
Ashish Hooda
M. Wallace
Kushal Jhunjhunwalla
Earlence Fernandes
Kassem Fawaz
AAML
16
4
0
16 Dec 2022
Ignorance is Bliss? The Effect of Explanations on Perceptions of Voice
  Assistants
Ignorance is Bliss? The Effect of Explanations on Perceptions of Voice Assistants
W. Seymour
Jose Such
53
14
0
23 Nov 2022
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous
  Vehicles Driving Frameworks
You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous Vehicles Driving Frameworks
Yulong Cao
Sri Hrushikesh Varma Bhupathiraju
Pirouz Naghavi
Takeshi Sugawara
Z. Morley Mao
Sara Rampazzi
AAML
69
61
0
18 Oct 2022
Symphony: Localizing Multiple Acoustic Sources with a Single Microphone
  Array
Symphony: Localizing Multiple Acoustic Sources with a Single Microphone Array
Weiguo Wang
Jinming Li
Yuan He
Yunhao Liu
66
51
0
30 Sep 2022
Rolling Colors: Adversarial Laser Exploits against Traffic Light
  Recognition
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
Chen Yan
Zhijian Xu
Zhanyuan Yin
Xiaoyu Ji
Wenyuan Xu
73
44
0
06 Apr 2022
Towards Adversarial Control Loops in Sensor Attacks: A Case Study to
  Control the Kinematics and Actuation of Embedded Systems
Towards Adversarial Control Loops in Sensor Attacks: A Case Study to Control the Kinematics and Actuation of Embedded Systems
Yazhou Tu
Sara Rampazzi
X. Hei
AAML
61
1
0
15 Mar 2022
GhostTalk: Interactive Attack on Smartphone Voice System Through Power
  Line
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line
Yuanda Wang
Hanqing Guo
Qiben Yan
AAML
77
40
0
05 Feb 2022
Iota: A Framework for Analyzing System-Level Security of IoTs
Iota: A Framework for Analyzing System-Level Security of IoTs
Zheng Fang
Hao Xu
Tianbo Gu
Pengfei Hu
Jinyue Song
Trent Jaeger
P. Mohapatra
34
10
0
05 Feb 2022
Signal Injection Attacks against CCD Image Sensors
Signal Injection Attacks against CCD Image Sensors
S. Köhler
Richard Baker
Ivan Martinovic
AAML
53
27
0
19 Aug 2021
ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes
ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes
Narmeen Shafqat
Daniel J. Dubois
David Choffnes
Aaron Schulman
Dinesh Bharadia
Aanjhan Ranganathan
33
12
0
22 Jul 2021
Open, Sesame! Introducing Access Control to Voice Services
Open, Sesame! Introducing Access Control to Voice Services
Dominika Woszczyk
Alvin Lee
Soteris Demetriou
AAML
28
1
0
27 Jun 2021
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Security and Privacy in the Emerging Cyber-Physical World: A Survey
Zhiyuan Yu
Zack Kaplan
Qiben Yan
Ning Zhang
49
32
0
27 May 2021
Robust Sensor Fusion Algorithms Against Voice Command Attacks in
  Autonomous Vehicles
Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles
Jiwei Guan
Xi Zheng
Chen Wang
Yipeng Zhou
A. Jolfaei
AAML
38
5
0
20 Apr 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
78
17
0
19 Mar 2021
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic
  Speech Recognition and Speaker Identification Systems
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
H. Abdullah
Kevin Warren
Vincent Bindschaedler
Nicolas Papernot
Patrick Traynor
AAML
76
129
0
13 Jul 2020
Sovereign: User-Controlled Smart Homes
Sovereign: User-Controlled Smart Homes
Zhiyi Zhang
Tianyuan Yu
Xinyu Ma
Yuanfeng Guan
Philipp Moll
Lixia Zhang
25
16
0
11 Jun 2020
Smart Home Personal Assistants: A Security and Privacy Review
Smart Home Personal Assistants: A Security and Privacy Review
Jide S. Edu
Jose Such
Guillermo Suarez-Tangil
41
94
0
13 Mar 2019
1