共 33 条
[1]
Carlini N, 2019, On evaluating adversarial robustness
[2]
Towards Evaluating the Robustness of Neural Networks
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:39-57
[3]
Caruana R., 2004, INT C MACH LEARN ICM, V69
[4]
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:694-711
[5]
ECAPA-TDNN: Emphasized Channel Attention, Propagation and Aggregation in TDNN Based Speaker Verification
[J].
INTERSPEECH 2020,
2020,
:3830-3834
[6]
Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks
[J].
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019),
2019,
:4307-4316
[7]
Boosting Adversarial Attacks with Momentum
[J].
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR),
2018,
:9185-9193
[9]
Garofolo J.S., 1993, TIMIT acoustic phonetic continuous speech corpus
[10]
Gong Y., 2017, CRAFTING ADVERSARIAL