Author of the publication

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection.

, , , , , and . RAID, page 366-380. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Federated IoT Interaction Vulnerability Analysis., , , , and . ICDE, page 1517-1530. IEEE, (2023)Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models., , , and . AsiaCCS, ACM, (2024)A Hybrid Approach for Sparse Data Classification Based on Topic Model., , , and . WAIM Workshops, volume 9998 of Lecture Notes in Computer Science, page 17-28. (2016)PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection., , , , , and . RAID, page 366-380. ACM, (2023)A Comprehensive Survey on Pretrained Foundation Models: A History from BERT to ChatGPT., , , , , , , , , and 9 other author(s). CoRR, (2023)FacER: Contrastive Attention based Expression Recognition via Smartphone Earpiece Speaker., , , , and . INFOCOM, page 1-10. IEEE, (2023)Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots., , , , and . RAID, page 282-296. ACM, (2023)TALCS: An open-source Mandarin-English code-switching corpus and a speech recognition baseline., , , , , , and . INTERSPEECH, page 1741-1745. ISCA, (2022)Socialite: Social Activity Mining and Friend Auto-labeling., , , and . IPCCC, page 1-8. IEEE, (2018)Robust MST-Based Clustering Algorithm., , , , , and . Neural Comput., (2018)