You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones | IEEE Conference Publication | IEEE Xplore