Author of the publication

Disappeared Command: Spoofing Attack On Automatic Speech Recognition Systems with Sound Masking.

, , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-supervised denoising model based on deep audio prior using single noisy marine mammal sound sample., , , and . Appl. Intell., 53 (21): 25697-25714 (November 2023)Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks., , , , , and . CVPR, page 13337-13347. IEEE, (2022)Subnet Replacement: Deployment-stage backdoor attack against deep neural networks in gray-box setting., , , and . CoRR, (2021)SO-link: A light-weight underwater wireless acoustic sensor networking protocol stack architecture for education., , and . WUWNet, page 34:1-34:2. ACM, (2018)uw-WiFi: An Underwater Wireless Sensor Network for Data Collection and Network Control in Real Environments., , , and . WUWNet, page 37:1-37:8. ACM, (2021)A Parallel Classification Model for Marine Mammal Sounds Based on Multi-Dimensional Feature Extraction and Data Augmentation., , , and . Sensors, 22 (19): 7443 (2022)TRAttack": " Text Rewriting Attack Against Text Retrieval., , , , and . RepL4NLP@ACL, page 191-203. Association for Computational Linguistics, (2022)Output-Relevant Common Trend Analysis for KPI-Related Nonstationary Process Monitoring With Applications to Thermal Power Plants., , , , , , and . IEEE Trans. Ind. Informatics, 17 (10): 6664-6675 (2021)Disappeared Command: Spoofing Attack On Automatic Speech Recognition Systems with Sound Masking., , , and . CoRR, (2022)Flying vision system of placement machine for MEMS microphone., , , and . ICARCV, page 2154-2159. IEEE, (2010)