共 69 条
[11]
[Anonymous], 2017, Apple Machine Learning Journal
[12]
[Anonymous], 2018, Persian Vowel recognition with MFCC and ANN on PCVC speech dataset
[13]
Brendel W, 2018, Arxiv, DOI arXiv:1712.04248
[14]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[15]
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
[J].
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018),
2018,
:1-7
[16]
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:694-711
[17]
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
[J].
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020),
2020,
:1277-1294
[18]
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[19]
Chen YX, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2667
[20]
Cheng MH, 2020, Arxiv, DOI arXiv:1909.10773