{"id":"https://openalex.org/W2765636281","doi":"https://doi.org/10.1145/3133956.3133962","title":"Hearing Your Voice is Not Enough","display_name":"Hearing Your Voice is Not Enough","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2765636281","doi":"https://doi.org/10.1145/3133956.3133962","mag":"2765636281"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3133962","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3133962","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074979316","display_name":"Linghan Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Linghan Zhang","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018231776","display_name":"Sheng Tan","orcid":"https://orcid.org/0000-0001-8242-0356"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sheng Tan","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068383847","display_name":"Jie Yang","orcid":"https://orcid.org/0000-0002-8244-2181"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5074979316"],"corresponding_institution_ids":["https://openalex.org/I103163165"],"apc_list":null,"apc_paid":null,"fwci":11.7748,"has_fulltext":false,"cited_by_count":190,"citation_normalized_percentile":{"value":0.99084136,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"57","last_page":"71"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10860","display_name":"Speech and Audio Processing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10201","display_name":"Speech Recognition and Synthesis","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8544284105300903},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6969951391220093},{"id":"https://openalex.org/keywords/microphone","display_name":"Microphone","score":0.6604196429252625},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5946372151374817},{"id":"https://openalex.org/keywords/gesture","display_name":"Gesture","score":0.5528400540351868},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5384258031845093},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.4763484299182892},{"id":"https://openalex.org/keywords/speaker-recognition","display_name":"Speaker recognition","score":0.46021994948387146},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.45505931973457336},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43446269631385803},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4288826882839203},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.4225800633430481},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.334442138671875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23666971921920776},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2218380868434906},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12964293360710144}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8544284105300903},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6969951391220093},{"id":"https://openalex.org/C2778263558","wikidata":"https://www.wikidata.org/wiki/Q46384","display_name":"Microphone","level":3,"score":0.6604196429252625},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5946372151374817},{"id":"https://openalex.org/C207347870","wikidata":"https://www.wikidata.org/wiki/Q371174","display_name":"Gesture","level":2,"score":0.5528400540351868},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5384258031845093},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.4763484299182892},{"id":"https://openalex.org/C133892786","wikidata":"https://www.wikidata.org/wiki/Q1145189","display_name":"Speaker recognition","level":2,"score":0.46021994948387146},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.45505931973457336},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43446269631385803},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4288826882839203},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.4225800633430481},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.334442138671875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23666971921920776},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2218380868434906},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12964293360710144},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C68115822","wikidata":"https://www.wikidata.org/wiki/Q1068172","display_name":"Sound pressure","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3133956.3133962","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3133962","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W267812377","https://openalex.org/W282499614","https://openalex.org/W583042331","https://openalex.org/W621767406","https://openalex.org/W1501187080","https://openalex.org/W1688416049","https://openalex.org/W1952705488","https://openalex.org/W1977936156","https://openalex.org/W1980581462","https://openalex.org/W1991482046","https://openalex.org/W1992153276","https://openalex.org/W1997687813","https://openalex.org/W2002399834","https://openalex.org/W2031475686","https://openalex.org/W2043149918","https://openalex.org/W2047346462","https://openalex.org/W2064463502","https://openalex.org/W2106351828","https://openalex.org/W2108665278","https://openalex.org/W2114376863","https://openalex.org/W2115042198","https://openalex.org/W2117544888","https://openalex.org/W2119775231","https://openalex.org/W2123299109","https://openalex.org/W2127078701","https://openalex.org/W2128466129","https://openalex.org/W2152135784","https://openalex.org/W2159456857","https://openalex.org/W2176804518","https://openalex.org/W2205853560","https://openalex.org/W2260330803","https://openalex.org/W2293407848","https://openalex.org/W2405641138","https://openalex.org/W2472787443","https://openalex.org/W2477060772","https://openalex.org/W2508073351","https://openalex.org/W2536166232","https://openalex.org/W2548055032","https://openalex.org/W2562436113","https://openalex.org/W2564082391","https://openalex.org/W2573369203","https://openalex.org/W2610995940","https://openalex.org/W2735454016","https://openalex.org/W2745896134","https://openalex.org/W4300038035","https://openalex.org/W6676288361"],"related_works":["https://openalex.org/W2533239677","https://openalex.org/W4389545061","https://openalex.org/W2140593870","https://openalex.org/W3126377002","https://openalex.org/W2903861076","https://openalex.org/W2604576816","https://openalex.org/W2729608596","https://openalex.org/W2913345013","https://openalex.org/W2900020547","https://openalex.org/W2465785224"],"abstract_inverted_index":{"Voice":[0],"biometrics":[1,27],"is":[2,8,28,152,206,213],"drawing":[3],"increasing":[4],"attention":[5],"as":[6,102,154],"it":[7,155,188,205],"a":[9,19,46,52,61,73,88,103,108,126,129,164,167],"promising":[10],"alternative":[11],"to":[12,30,39,119,135,208,215],"legacy":[13],"passwords":[14],"for":[15,65,147],"mobile":[16,92],"authentication.":[17],"Recently,":[18],"growing":[20],"body":[21],"of":[22,83,184],"work":[23,216],"shows":[24,186],"that":[25,169,187,204],"voice":[26,41,48],"vulnerable":[29],"spoofing":[31],"through":[32],"replay":[33,66],"attacks,":[34],"where":[35],"an":[36],"adversary":[37],"tries":[38],"spoof":[40],"authentication":[42],"systems":[43],"by":[44,76],"using":[45],"pre-recorded":[47],"sample":[49],"collected":[50],"from":[51,113],"genuine":[53],"user.":[54],"In":[55],"this":[56],"work,":[57],"we":[58],"propose":[59],"VoiceGesture,":[60],"liveness":[62],"detection":[63,68,192],"system":[64,98],"attack":[67],"on":[69,173],"smartphones.":[70,174],"It":[71],"detects":[72],"live":[74,148],"user":[75,85,127,149],"leveraging":[77],"both":[78],"the":[79,84,91,100,114,120,123],"unique":[80],"articulatory":[81,137],"gesture":[82,138],"when":[86,125],"speaking":[87],"passphrase":[89],"and":[90,117,166,181,212],"audio":[93],"hardware":[94,162],"advances.":[95],"Specifically,":[96],"our":[97],"re-uses":[99],"smartphone":[101],"Doppler":[104,141],"radar,":[105],"which":[106,143],"transmits":[107],"high":[109],"frequency":[110],"acoustic":[111],"sound":[112],"built-in":[115],"speaker":[116,165],"listens":[118],"reflections":[121,133],"at":[122,194],"microphone":[124,168],"speaks":[128],"passphrase.":[130],"The":[131],"signal":[132],"due":[134],"user's":[136],"result":[139],"in":[140],"shifts,":[142],"are":[144,170],"then":[145],"analyzed":[146],"detection.":[150],"VoiceGesture":[151],"practical":[153],"requires":[156],"neither":[157],"cumbersome":[158],"operations":[159],"nor":[160],"additional":[161],"but":[163],"commonly":[171],"available":[172],"Our":[175],"experimental":[176],"evaluation":[177],"with":[178,217],"21":[179],"participants":[180],"different":[182,209,218],"types":[183],"phones":[185],"achieves":[189],"over":[190],"99%":[191],"accuracy":[193],"around":[195],"1%":[196],"Equal":[197],"Error":[198],"Rate":[199],"(EER).":[200],"Results":[201],"also":[202],"show":[203],"robust":[207],"phone":[210],"placements":[211],"able":[214],"sampling":[219],"frequencies.":[220]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":21},{"year":2023,"cited_by_count":26},{"year":2022,"cited_by_count":23},{"year":2021,"cited_by_count":40},{"year":2020,"cited_by_count":27},{"year":2019,"cited_by_count":24},{"year":2018,"cited_by_count":12}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
