-
On the Existence of Characterization Logics and Fundamental Properties of Argumentation Semantics
Authors:
Ringo Baumann
Abstract:
Given the large variety of existing logical formalisms it is of utmost importance to select the most adequate one for a specific purpose, e.g. for representing the knowledge relevant for a particular application or for using the formalism as a modeling tool for problem solving. Awareness of the nature of a logical formalism, in other words, of its fundamental intrinsic properties, is indispensable…
▽ More
Given the large variety of existing logical formalisms it is of utmost importance to select the most adequate one for a specific purpose, e.g. for representing the knowledge relevant for a particular application or for using the formalism as a modeling tool for problem solving. Awareness of the nature of a logical formalism, in other words, of its fundamental intrinsic properties, is indispensable and provides the basis of an informed choice. In this treatise we consider the existence characterization logics as well as properties like existence and uniqueness, expressibility, replaceability and verifiability in the realm of abstract argumentation
△ Less
Submitted 2 March, 2020;
originally announced March 2020.
-
Voice Spoofing Detection Corpus for Single and Multi-order Audio Replays
Authors:
Roland Baumann,
Khalid Mahmood Malik,
Ali Javed,
Andersen Ball,
Brandon Kujawa,
Hafiz Malik
Abstract:
The evolution of modern voice controlled devices (VCDs) in recent years has revolutionized the Internet of Things, and resulted in increased realization of smart homes, personalization and home automation through voice commands. The introduction of VCDs in IoT is expected to give emergence of new subfield of IoT, called Multimedia of Thing (MoT). These VCDs can be exploited in IoT driven environme…
▽ More
The evolution of modern voice controlled devices (VCDs) in recent years has revolutionized the Internet of Things, and resulted in increased realization of smart homes, personalization and home automation through voice commands. The introduction of VCDs in IoT is expected to give emergence of new subfield of IoT, called Multimedia of Thing (MoT). These VCDs can be exploited in IoT driven environment to generate various spoofing attacks including the replays. Replay attacks are generated through replaying the recorded audio of legitimate human speaker with the intent of deceiving the VCDs having speaker verification system. The connectivity among the VCDs can easily be exploited in IoT driven environment to generate a chain of replay attacks (multi-order replay attacks). Existing spoofing detection datasets like ASVspoof and ReMASC contain only the first-order replay recordings against the bonafide audio samples. These datasets can not offer evaluation of the anti-spoofing algorithms capable of detecting the multi-order replay attacks. Additionally, these datasets do not capture the characteristics of microphone arrays, which is an important characteristic of modern VCDs. We need a diverse replay spoofing detection corpus that consists of multi-order replay recordings against the bonafide voice samples. This paper presents a novel voice spoofing detection corpus (VSDC) to evaluate the performance of multi-order replay anti-spoofing methods. The proposed VSDC consists of first and second-order-replay samples against the bonafide audio recordings. Additionally, the proposed VSDC can also be used to evaluate the performance of speaker verification systems as our corpus includes the audio samples of fifteen different speakers. To the best of our knowledge, this is the first publicly available replay spoofing detection corpus comprising of first-order and second-order-replay samples.
△ Less
Submitted 2 September, 2019;
originally announced September 2019.
-
Towards Vulnerability Analysis of Voice-Driven Interfaces and Countermeasures for Replay
Authors:
Khalid Mahmood Malik,
Hafiz Malik,
Roland Baumann
Abstract:
Fake audio detection is expected to become an important research area in the field of smart speakers such as Google Home, Amazon Echo and chatbots developed for these platforms. This paper presents replay attack vulnerability of voice-driven interfaces and proposes a countermeasure to detect replay attack on these platforms. This paper presents a novel framework to model replay attack distortion,…
▽ More
Fake audio detection is expected to become an important research area in the field of smart speakers such as Google Home, Amazon Echo and chatbots developed for these platforms. This paper presents replay attack vulnerability of voice-driven interfaces and proposes a countermeasure to detect replay attack on these platforms. This paper presents a novel framework to model replay attack distortion, and then use a non-learning-based method for replay attack detection on smart speakers. The reply attack distortion is modeled as a higher-order nonlinearity in the replay attack audio. Higher-order spectral analysis (HOSA) is used to capture characteristics distortions in the replay audio. Effectiveness of the proposed countermeasure scheme is evaluated on original speech as well as corresponding replayed recordings. The replay attack recordings are successfully injected into the Google Home device via Amazon Alexa using the drop-in conferencing feature.
△ Less
Submitted 13 April, 2019;
originally announced April 2019.
-
Verifiability of Argumentation Semantics
Authors:
Ringo Baumann,
Thomas Linsbichler,
Stefan Woltran
Abstract:
Dung's abstract argumentation theory is a widely used formalism to model conflicting information and to draw conclusions in such situations. Hereby, the knowledge is represented by so-called argumentation frameworks (AFs) and the reasoning is done via semantics extracting acceptable sets. All reasonable semantics are based on the notion of conflict-freeness which means that arguments are only join…
▽ More
Dung's abstract argumentation theory is a widely used formalism to model conflicting information and to draw conclusions in such situations. Hereby, the knowledge is represented by so-called argumentation frameworks (AFs) and the reasoning is done via semantics extracting acceptable sets. All reasonable semantics are based on the notion of conflict-freeness which means that arguments are only jointly acceptable when they are not linked within the AF. In this paper, we study the question which information on top of conflict-free sets is needed to compute extensions of a semantics at hand. We introduce a hierarchy of so-called verification classes specifying the required amount of information. We show that well-known standard semantics are exactly verifiable through a certain such class. Our framework also gives a means to study semantics lying inbetween known semantics, thus contributing to a more abstract understanding of the different features argumentation semantics offer.
△ Less
Submitted 31 March, 2016;
originally announced March 2016.
-
Compact Argumentation Frameworks
Authors:
Ringo Baumann,
Wolfgang Dvorák,
Thomas Linsbichler,
Hannes Strass,
Stefan Woltran
Abstract:
Abstract argumentation frameworks (AFs) are one of the most studied formalisms in AI. In this work, we introduce a certain subclass of AFs which we call compact. Given an extension-based semantics, the corresponding compact AFs are characterized by the feature that each argument of the AF occurs in at least one extension. This not only guarantees a certain notion of fairness; compact AFs are thus…
▽ More
Abstract argumentation frameworks (AFs) are one of the most studied formalisms in AI. In this work, we introduce a certain subclass of AFs which we call compact. Given an extension-based semantics, the corresponding compact AFs are characterized by the feature that each argument of the AF occurs in at least one extension. This not only guarantees a certain notion of fairness; compact AFs are thus also minimal in the sense that no argument can be removed without changing the outcome. We address the following questions in the paper: (1) How are the classes of compact AFs related for different semantics? (2) Under which circumstances can AFs be transformed into equivalent compact ones? (3) Finally, we show that compact AFs are indeed a non-trivial subclass, since the verification problem remains coNP-hard for certain semantics.
△ Less
Submitted 30 April, 2014;
originally announced April 2014.
-
The Axiomatic Foundation of Space in GFO
Authors:
Ringo Baumann,
Heinrich Herre
Abstract:
Space and time are basic categories of any top-level ontology. They are fundamental assumptions for the mode of existence of those individuals which are said to be in space and time. In the present paper the ontology of space in the General Formal Ontology (GFO) is expounded. This ontology is represented as a theory BT (Brentano Theory), which is specified by a set of axioms formalized in first-or…
▽ More
Space and time are basic categories of any top-level ontology. They are fundamental assumptions for the mode of existence of those individuals which are said to be in space and time. In the present paper the ontology of space in the General Formal Ontology (GFO) is expounded. This ontology is represented as a theory BT (Brentano Theory), which is specified by a set of axioms formalized in first-order logic. This theory uses four primitive relations: SReg(x) (x is space region), spart(x, y) (x is spatial part of y), sb(x, y) (x is spatial boundary of y), and scoinc(x, y) (x and y spatially coincide). This ontology is inspired by ideas of Franz Brentano. The investigation and exploration of Franz Brentano's ideas on space and time began about twenty years ago by work of R.M. Chisholm, B. Smith and A. Varzi. The present paper takes up this line of research and makes a further step in establishing an ontology of space which is based on rigorous logical methods and on principles of the new philosophical approach of integrative realism.
△ Less
Submitted 23 September, 2011;
originally announced October 2011.