Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for defending inaudible instruction to control voice assistant based on machine learning

A technology of machine learning and command control, which is applied in the security field of artificial intelligence voice assistants, and can solve problems such as long cycle, high difficulty, reducing screen brightness or volume, etc.

Active Publication Date: 2018-06-15
ZHEJIANG UNIV
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 5. Hidden attack: The screen display and voice feedback may expose the attack, but the hacker can reduce the screen brightness or volume to achieve the purpose of hiding
[0018] 1. Manufacturers are unable to improve the hardware of smart devices that have already been sold, or the cost of recall is unaffordable for manufacturers
[0019] 2. The ability of the microphone circuit to receive ultrasonic waves has always been a problem. Although with the progress and development of technology and technology, it has not been effectively solved. Therefore, the defense scheme based on hardware is a high-cost, difficult and long-term defense. solutions, cannot effectively solve the existing problems
[0020] 3. The software-based solution in the prior art only tested a voice command "Hey" on one smart device, so it is not sure whether this method can work on different smart devices, different voice commands, and different human voices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for defending inaudible instruction to control voice assistant based on machine learning
  • Method for defending inaudible instruction to control voice assistant based on machine learning
  • Method for defending inaudible instruction to control voice assistant based on machine learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Preferred embodiments of the present invention will be described in detail below.

[0060] figure 2 It is a comparison diagram of normal voice signal and malicious voice signal in the time-frequency domain; through figure 2 , it can be found that there is a significant difference in the high frequency band between the ordinary voice signal recorded by the mobile phone and the malicious signal (the demodulated signal). Therefore, malicious voice commands can be identified by machine learning algorithms. Such as image 3 with 4 As shown, the present invention provides targeted defense against "dolphin sound attack", and can detect the silent voice command of "dolphin sound attack", thereby fundamentally solving the possibility of voice assistants and smart devices being controlled by silent voice commands.

[0061] The following embodiment is a method for controlling a voice assistant based on machine learning defense against silent commands, and the defense device ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for defending an inaudible instruction to control a voice assistant based on machine learning. The method comprises the following steps: 1) acquiring the data of positive and negative samples, 2) performing data segmentation on the positive and negative sample data; 3) performing sample feature selection and normalization; 4) selecting a classifier for training andgenerating a detection model used for detecting a malicious voice command; and 5) detecting the voice command to be detected through the obtained detection model. According to the invention, a creative feature selection method is selected, and the method is directed to intelligent devices with different models, and a normal voice command and the malicious voice command need to be acquired throughthe intelligent devices of the type, and a specific classifier for the type of device is trained as positive and negative samples. Through the customized mode, the problem that the detection and defense cannot be carried out by cross devices can be well solved.

Description

technical field [0001] The invention belongs to the security field of artificial intelligence voice assistants, and in particular relates to a method for controlling voice assistants based on machine learning defense silent commands. Background technique [0002] As a convenient and effective method of human-computer interaction, voice assistants such as Siri, Google Now, Alexa, Cortana, S Voice, and Hi Voice are becoming more and more popular in people's lives. Almost all smart devices (smart phones, tablets Computers, wearable devices and smart speakers) are equipped with corresponding voice assistants. [0003] However, voice assistants also face various security risks, such as a method called "dolphin sound attack" [Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T.,&Xu,W.(2017).DolphinAtack:Inaudible Voice Commands.arXiv preprint arXiv:1708.09537.], using the vulnerability of the microphone circuit of the smart device, the voice assistant can be silently controlled to or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G10L15/22G10L25/03G10L25/18G10L25/51G06N99/00
CPCG06N20/00G10L15/22G10L25/03G10L25/18G10L25/51G10L17/26G06N20/10G10L15/063G10L15/26
Inventor 徐文渊冀晓宇张国明闫琛张天晨张泰民
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products