{"id":"https://openalex.org/W4410087415","doi":"https://doi.org/10.1109/ccnc54725.2025.10975995","title":"Can We Trust Your Voice? Exploring Vulnerabilities in Voice Authentication","display_name":"Can We Trust Your Voice? Exploring Vulnerabilities in Voice Authentication","publication_year":2025,"publication_date":"2025-01-10","ids":{"openalex":"https://openalex.org/W4410087415","doi":"https://doi.org/10.1109/ccnc54725.2025.10975995"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc54725.2025.10975995","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc54725.2025.10975995","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 22nd Consumer Communications &amp;amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101633771","display_name":"Ke Li","orcid":"https://orcid.org/0000-0003-2452-5592"},"institutions":[{"id":"https://openalex.org/I200719446","display_name":"Vanderbilt University","ror":"https://ror.org/02vm5rt34","country_code":"US","type":"education","lineage":["https://openalex.org/I200719446"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ke Li","raw_affiliation_strings":["Vanderbilt University,Department of Computer Science,Nashville,TN,USA,37211"],"affiliations":[{"raw_affiliation_string":"Vanderbilt University,Department of Computer Science,Nashville,TN,USA,37211","institution_ids":["https://openalex.org/I200719446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022957687","display_name":"Cameron Baird","orcid":null},"institutions":[{"id":"https://openalex.org/I200719446","display_name":"Vanderbilt University","ror":"https://ror.org/02vm5rt34","country_code":"US","type":"education","lineage":["https://openalex.org/I200719446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cameron Baird","raw_affiliation_strings":["Vanderbilt University,Department of Computer Science,Nashville,TN,USA,37211"],"affiliations":[{"raw_affiliation_string":"Vanderbilt University,Department of Computer Science,Nashville,TN,USA,37211","institution_ids":["https://openalex.org/I200719446"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101655052","display_name":"Dan Lin","orcid":"https://orcid.org/0000-0002-3062-8240"},"institutions":[{"id":"https://openalex.org/I200719446","display_name":"Vanderbilt University","ror":"https://ror.org/02vm5rt34","country_code":"US","type":"education","lineage":["https://openalex.org/I200719446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Lin","raw_affiliation_strings":["Vanderbilt University,Department of Computer Science,Nashville,TN,USA,37211"],"affiliations":[{"raw_affiliation_string":"Vanderbilt University,Department of Computer Science,Nashville,TN,USA,37211","institution_ids":["https://openalex.org/I200719446"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101633771"],"corresponding_institution_ids":["https://openalex.org/I200719446"],"apc_list":null,"apc_paid":null,"fwci":6.0503,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.95260659,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12151","display_name":"Interpreting and Communication in Healthcare","score":0.4634000062942505,"subfield":{"id":"https://openalex.org/subfields/3600","display_name":"General Health Professions"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T12151","display_name":"Interpreting and Communication in Healthcare","score":0.4634000062942505,"subfield":{"id":"https://openalex.org/subfields/3600","display_name":"General Health Professions"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6817724704742432},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6146833896636963},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.5112051963806152},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5020418167114258},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4797959625720978},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.3517380356788635},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20517519116401672},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1207171082496643}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6817724704742432},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6146833896636963},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.5112051963806152},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5020418167114258},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4797959625720978},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.3517380356788635},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20517519116401672},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1207171082496643}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc54725.2025.10975995","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc54725.2025.10975995","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 22nd Consumer Communications &amp;amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[{"id":"https://openalex.org/G5691385418","display_name":null,"funder_award_id":"DGE-1946619,CNS-2243161","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1494198834","https://openalex.org/W1574447377","https://openalex.org/W2008056655","https://openalex.org/W2035222601","https://openalex.org/W2041823554","https://openalex.org/W2101234009","https://openalex.org/W2103250316","https://openalex.org/W2107699930","https://openalex.org/W2108598243","https://openalex.org/W2114367267","https://openalex.org/W2165880886","https://openalex.org/W2587150483","https://openalex.org/W2916104401","https://openalex.org/W2934843808","https://openalex.org/W2944916619","https://openalex.org/W2962763344","https://openalex.org/W3042368254","https://openalex.org/W3116515605","https://openalex.org/W3137382759","https://openalex.org/W3153453329","https://openalex.org/W3155956353","https://openalex.org/W3163083600","https://openalex.org/W3198570670","https://openalex.org/W3201506562","https://openalex.org/W4255421341","https://openalex.org/W4360995550","https://openalex.org/W4381198892","https://openalex.org/W4382119306","https://openalex.org/W4385080277","https://openalex.org/W4387212527","https://openalex.org/W4400762160","https://openalex.org/W6737575990","https://openalex.org/W6853075663","https://openalex.org/W6857558525","https://openalex.org/W6857796267"],"related_works":["https://openalex.org/W2084179496","https://openalex.org/W2103238357","https://openalex.org/W2741704743","https://openalex.org/W2262810789","https://openalex.org/W4386040921","https://openalex.org/W2749819919","https://openalex.org/W2993764333","https://openalex.org/W2977917096","https://openalex.org/W4405907242","https://openalex.org/W2912135041"],"abstract_inverted_index":{"As":[0],"voice":[1,23,85,163],"authentication":[2,24,86,164],"technology":[3],"becomes":[4],"more":[5],"prevalent,":[6],"its":[7],"security":[8],"flaws":[9],"and":[10,46,83,92,98,117,137,156],"vulnerabilities":[11],"are":[12,35],"garnering":[13],"increasing":[14],"scrutiny.":[15],"State-of-the-art":[16],"deep":[17],"neural":[18],"network":[19],"(DNN)":[20],"systems":[21],"for":[22],"can":[25],"achieve":[26],"an":[27,144],"accuracy":[28,145],"of":[29,55,59,128,147,158],"over":[30,148],"95%.":[31],"However,":[32],"DNN-based":[33,61],"models":[34,62,87],"known":[36],"to":[37,40,63,71,88,123,138],"be":[38],"vulnerable":[39],"attacks":[41],"such":[42],"as":[43],"adversarial":[44],"examples":[45],"data":[47,80,130],"poisoning.":[48],"An":[49],"adversary":[50],"may":[51],"also":[52],"take":[53],"advantage":[54],"the":[56,65,90,106,125,159],"limited":[57],"generalization":[58],"current":[60],"circumvent":[64],"system,":[66],"only":[67],"requiring":[68],"authentic":[69],"voices":[70],"impersonate":[72],"others.":[73],"In":[74],"this":[75],"paper,":[76],"we":[77],"leverage":[78],"a":[79,103,153],"poisoning":[81,131],"attack":[82],"two":[84],"investigate":[89],"vulnerability":[91],"corresponding":[93],"impacts":[94,127],"on":[95],"individual":[96],"user":[97],"system":[99,141],"security.":[100],"We":[101],"introduce":[102],"new":[104],"toolkit,":[105],"Voice":[107],"Authentication":[108],"Poisoning":[109],"Impact":[110],"Evaluator":[111],"(VAPIE),":[112],"incorporating":[113],"conventional":[114],"machine":[115],"learning":[116],"VGG-based":[118],"models.":[119],"VAPIE":[120],"is":[121],"designed":[122],"predict":[124],"potential":[126],"various":[129],"scenarios":[132],"launched":[133],"by":[134],"different":[135],"attack-ers":[136],"evaluate":[139],"overall":[140],"security,":[142],"achieving":[143],"rate":[146],"70":[149],"%.":[150],"This":[151],"facilitates":[152],"deeper":[154],"understanding":[155],"mitigation":[157],"risks":[160],"associated":[161],"with":[162],"technologies.":[165]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
