Symposium on Electronic Crime Research (eCrime),
pages 57–69. IEEE, 2017.
[26]
Battista Biggio, Igino Corona, Davide Maiorca, Blaine
Nelson, Nedim Šrndi
´
c, Pavel Laskov, Giorgio Giacinto,
and Fabio Roli. Evasion attacks against machine
learning at test time. In Joint European conference on
machine learning and knowledge discovery in databases,
pages 387–402. Springer, 2013.
[27]
Piotr Bojanowski, Edouard Grave, Armand Joulin,
and Tomas Mikolov. Enriching word vectors with
subword information. Transactions of the Association
for Computational Linguistics, 5:135–146, 2017.
[28]
Elie Bursztein, Romain Beauxis, Hristo Paskov, Daniele
Perito, Celine Fabry, and John Mitchell. The failure of
noise-based non-continuous audio captchas. In 2011
IEEE symposium on security and privacy, pages 19–31.
IEEE Computer Society, 2011.
[29]
Elie Bursztein and Steven Bethard. Decaptcha: breaking
75% of ebay audio captchas. In Proceedings of the
3rd USENIX conference on Offensive technologies,
volume 1, page 8. USENIX Association, 2009.
[30]
Nicholas Carlini, Pratyush Mishra, Tavish Vaidya,
Yuankai Zhang, Micah Sherr, Clay Shields, David
Wagner, and Wenchao Zhou. Hidden voice commands.
In 25th USENIX security symposium (USENIX security
16), pages 513–530, 2016.
[31]
Jiaao Chen, Yuwei Wu, and Diyi Yang. Semi-supervised
models via data augmentationfor classifying interactive
affective responses. arXiv preprint arXiv:2004.10972,
2020.
[32]
Catalin Cimpanu. Fcc tells us telcos to imple-
ment caller id authentication by june 30, 2021.
https://www.zdnet.com/article/fcc-tells-us-telcos-to-
implement-caller-id-authentication-by-june-30-2021/,
Mar 2020.
[33]
Leigh Clark, Nadia Pantidi, Orla Cooney, Philip Doyle,
Diego Garaialde, Justin Edwards, Brendan Spillane,
Emer Gilmartin, Christine Murad, Cosmin Munteanu,
et al. What makes a good conversation? challenges in
designing truly conversational agents. In Proceedings
of the 2019 CHI Conference on Human Factors in
Computing Systems, pages 1–12, 2019.
[34]
Meir Cohen, Eliyahu Finkelman, Ethan Garr, and Bryan
Moyles. Call distribution techniques. U.S. Patent
9,584,658, issued February 28, 2017.
[35]
Alexis Conneau, Douwe Kiela, Holger Schwenk, Loic
Barrault, and Antoine Bordes. Supervised learning of
universal sentence representations from natural language
inference data. arXiv preprint arXiv:1705.02364, 2017.
[36]
Andrei Costin, Jelena Isacenkova, Marco Balduzzi,
Aurélien Francillon, and Davide Balzarotti. The role of
phone numbers in understanding cyber-crime schemes.
In 2013 Eleventh Annual Conference on Privacy,
Security and Trust, pages 213–220. IEEE, 2013.
[37]
Valerie Fanelle, Sepideh Karimi, Aditi Shah, Bharath
Subramanian, and Sauvik Das. Blind and human:
Exploring more usable audio captcha designs. In
Sixteenth Symposium on Usable Privacy and Security
(SOUPS 2020), pages 111–125, 2020.
[38]
Mahak Gambhir and Vishal Gupta. Recent automatic
text summarization techniques: a survey. Artificial
Intelligence Review, 47(1):1–66, 2017.
[39]
Karthik Gopalakrishnan, Behnam Hedayatnia, Qinglang
Chen, Anna Gottardi, Sanjeev Kwatra, Anu Venkatesh,
Raefer Gabriel, Dilek Hakkani-Tür, and Amazon Alexa
AI. Topical-chat: Towards knowledge-grounded
open-domain conversations. In INTERSPEECH, pages
1891–1895, 2019.
[40]
Ting-Hao Kenneth Huang, Walter S Lasecki, Amos
Azaria, and Jeffrey P Bigham. " is there anything
else i can help you with?" challenges in deploying an
on-demand crowd-powered conversational agent. In
Fourth AAAI Conference on Human Computation and
Crowdsourcing, 2016.
[41]
Vlado Keselj. Speech and language processing
daniel jurafsky and james h. martin (stanford univer-
sity and university of colorado at boulder) pearson
prentice hall, 2009, xxxi+ 988 pp; hardbound, isbn
978-0-13-187321-6, 2009.
[42]
Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu,
Xuezhi Cao, Weinan Zhang, Yong Yu, and Dawn Song.
A machine learning approach to prevent malicious calls
over telephony networks. In 2018 IEEE Symposium on
Security and Privacy (SP), pages 53–69. IEEE, 2018.
[43]
Shujun Li, S Amier Haider Shah, M Asad Usman Khan,
Syed Ali Khayam, Ahmad-Reza Sadeghi, and Roland
Schmitz. Breaking e-banking captchas. In Proceedings
of the 26th Annual Computer Security Applications
Conference, pages 171–180, 2010.
[44]
Weixin Liang, Youzhi Tian, Chengcai Chen, and Zhou
Yu. Moss: End-to-end dialog system framework with
modular supervision. In Proceedings of the AAAI
Conference on Artificial Intelligence, volume 34, pages
8327–8335, 2020.
[45]
Chia-Wei Liu, Ryan Lowe, Iulian V Serban, Michael
Noseworthy, Laurent Charlin, and Joelle Pineau. How
not to evaluate your dialogue system: An empirical study