共 33 条
- [1] Towards Evaluating the Robustness of Neural Networks [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
- [2] Audio Adversarial Examples: Targeted Attacks on Speech-to-Text [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 1 - 7
- [3] Casey M., 2001, Organised Sound, V6, P153, DOI DOI 10.1017/S1355771801002126
- [4] Data Analytics for Fault Localization in Complex Networks [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05): : 701 - 708
- [5] ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio [J]. MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2018, PT III, 2019, 11053 : 677 - 681
- [8] Goodfellow I., 2015, P INT C LEARN REPR
- [10] Perceptually Constrained Fast Adversarial Audio Attacks [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 819 - 824