Securing Voice-Driven Interfaces Against Fake (Cloned) Audio Attacks | IEEE Conference Publication | IEEE Xplore