Author of the publication

VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation.

, , , , and . WISEC, page 239-250. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems., , , , , and . CoRR, (2023)Organisation structure and enterprise modelling in ERP realisation., and . Int. J. Netw. Virtual Organisations, 1 (2): 170-183 (2002)Jailbreaker in Jail: Moving Target Defense for Large Language Models., , and . MTD@CCS, page 29-32. ACM, (2023)VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation., , , , and . WISEC, page 239-250. ACM, (2023)Audio similarity comparison system of english dubbing on android platform., , , , , and . ICIA, page 692-697. IEEE, (2017)PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection., , , , , and . RAID, page 366-380. ACM, (2023)Comparing Sales Strategies Using the Markov Chain Relationship Model., , , and . ICEB, page 266-271. Academic Publishers/World Publishing Corporation, (2004)Optimal inventory decisions in a multiperiod newsvendor problem with partially observed Markovian supply capacities., , and . Eur. J. Oper. Res., 202 (2): 502-517 (2010)IoTCom: Dissecting Interaction Threats in IoT Systems., , , , and . IEEE Trans. Software Eng., 49 (4): 1523-1539 (April 2023)Graph Learning for Interactive Threat Detection in Heterogeneous Smart Home Rule Data., , , , , and . Proc. ACM Manag. Data, 1 (1): 102:1-102:27 (2023)