论文学习
11
论文学习:Austere Flash Caching with Deduplication and Compression
论文学习:Seeing is Not Believing:Camouflage Attacks on Image Scaling Algorithms
论文学习:On Training Robust PDF Malware Classifiers
论文学习:Humpty Dumpty:Controlling Word Meanings via Corpus Poisoning
论文学习:A Comprehensive Survey on Fog Computing State-of-the-Art and Research Challenges(未完待续。。。)
Adversarial Example
5
Dompteur: Taming Audio Adversarial Examples
Adversarial Defense for Automatic Speaker Verification by Cascaded Self-Supervised Learning Models
论文学习:Towards Query-Efficient Adversarial Attacks Against Automatic Speech Recognition Systems
论文学习:Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
论文学习:Practical Adversarial Attacks Against Speaker Recognition Systems
Speaker Recognition
4
Adversarial Defense for Automatic Speaker Verification by Cascaded Self-Supervised Learning Models
论文学习:Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
论文学习:Practical Adversarial Attacks Against Speaker Recognition Systems
论文学习:Lip Reading-Based User Authentication Through Acoustic Sensing on Smartphones