Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
1901.07846
Cited By
v1
v2 (latest)
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
23 January 2019
Tianyu Du
S. Ji
Jinfeng Li
Qinchen Gu
Ting Wang
R. Beyah
AAML
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems"
34 / 34 papers shown
Title
Adversarial Examples Versus Cloud-based Detectors: A Black-box Empirical Study
Xurong Li
S. Ji
Men Han
Juntao Ji
Zhenyu Ren
Yushan Liu
Chunming Wu
AAML
82
31
0
04 Jan 2019
Adversarial CAPTCHAs
Chenghui Shi
Xiaogang Xu
S. Ji
Kai Bu
Jianhai Chen
R. Beyah
Ting Wang
AAML
41
53
0
04 Jan 2019
TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li
S. Ji
Tianyu Du
Bo Li
Ting Wang
SILM
AAML
216
747
0
13 Dec 2018
Interpretable Deep Learning under Fire
Xinyang Zhang
Ningfei Wang
Hua Shen
S. Ji
Xiapu Luo
Ting Wang
AAML
AI4CE
132
173
0
03 Dec 2018
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji
Xinyang Zhang
S. Ji
Xiapu Luo
Ting Wang
SILM
AAML
189
187
0
02 Dec 2018
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Xuejing Yuan
Yuxuan Chen
Yue Zhao
Yunhui Long
Xiaokang Liu
Kai Chen
Shengzhi Zhang
Heqing Huang
Xiaofeng Wang
Carl A. Gunter
AAML
85
355
0
24 Jan 2018
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
Nicholas Carlini
D. Wagner
AAML
101
1,083
0
05 Jan 2018
The Insecurity of Home Digital Voice Assistants -- Amazon Alexa as a Case Study
Xinyu Lei
Guan-Hua Tu
A. Liu
Kamran Ali
Chi-Yu Li
Tian Xie
79
84
0
09 Dec 2017
Crafting Adversarial Examples For Speech Paralinguistics Applications
Yuan Gong
C. Poellabauer
AAML
79
122
0
09 Nov 2017
Knowledge Transfer from Weakly Labeled Audio using Convolutional Neural Network for Sound Events and Scenes
Anurag Kumar
Maksim Khadkevich
C. Fügen
60
140
0
04 Nov 2017
DolphinAtack: Inaudible Voice Commands
Guoming Zhang
Chen Yan
Xiaoyu Ji
Taimin Zhang
Tianchen Zhang
Wenyuan Xu
AAML
53
696
0
31 Aug 2017
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models
Pin-Yu Chen
Huan Zhang
Yash Sharma
Jinfeng Yi
Cho-Jui Hsieh
AAML
106
1,887
0
14 Aug 2017
Exploring Neural Transducers for End-to-End Speech Recognition
Eric Battenberg
Jitong Chen
R. Child
Adam Coates
Yashesh Gaur Yi Li
...
Hairong Liu
S. Satheesh
David Seetapun
Anuroop Sriram
Zhenyao Zhu
AI4TS
86
230
0
24 Jul 2017
Houdini: Fooling Deep Structured Prediction Models
Moustapha Cissé
Yossi Adi
Natalia Neverova
Joseph Keshet
AAML
87
272
0
17 Jul 2017
Dual Path Networks
Yunpeng Chen
Jianan Li
Huaxin Xiao
Xiaojie Jin
Shuicheng Yan
Jiashi Feng
93
830
0
06 Jul 2017
Continuous Authentication for Voice Assistants
Huan Feng
Kassem Fawaz
Kang G. Shin
AAML
61
270
0
17 Jan 2017
Aggregated Residual Transformations for Deep Neural Networks
Saining Xie
Ross B. Girshick
Piotr Dollár
Zhuowen Tu
Kaiming He
527
10,358
0
16 Nov 2016
Universal adversarial perturbations
Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
P. Frossard
AAML
164
2,534
0
26 Oct 2016
CNN Architectures for Large-Scale Audio Classification
Shawn Hershey
Sourish Chaudhuri
D. Ellis
J. Gemmeke
A. Jansen
...
Rif A. Saurous
Bryan Seybold
M. Slaney
Ron J. Weiss
K. Wilson
141
2,510
0
29 Sep 2016
Convolutional Recurrent Neural Networks for Music Classification
Keunwoo Choi
Gyorgy Fazekas
Mark Sandler
Kyunghyun Cho
422
475
0
14 Sep 2016
Densely Connected Convolutional Networks
Gao Huang
Zhuang Liu
Laurens van der Maaten
Kilian Q. Weinberger
PINN
3DV
870
36,910
0
25 Aug 2016
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
551
5,914
0
08 Jul 2016
Automatic tagging using deep convolutional neural networks
Keunwoo Choi
Gyorgy Fazekas
Mark Sandler
177
329
0
01 Jun 2016
Wide Residual Networks
Sergey Zagoruyko
N. Komodakis
362
8,005
0
23 May 2016
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices
Giuseppe Petracca
Yuqiong Sun
Ahmad Atamli-Reineh
Trent Jaeger
AAML
94
78
0
01 Apr 2016
Deep Residual Learning for Image Recognition
Kaiming He
Xinming Zhang
Shaoqing Ren
Jian Sun
MedIm
2.3K
194,641
0
10 Dec 2015
End-to-End Attention-based Large Vocabulary Speech Recognition
Dzmitry Bahdanau
J. Chorowski
Dmitriy Serdyuk
Philemon Brakel
Yoshua Bengio
94
1,152
0
18 Aug 2015
Deep Learning and Music Adversaries
Corey Kereliuk
Bob L. T. Sturm
J. Larsen
AAML
83
137
0
16 Jul 2015
Explaining and Harnessing Adversarial Examples
Ian Goodfellow
Jonathon Shlens
Christian Szegedy
AAML
GAN
282
19,145
0
20 Dec 2014
Deep Speech: Scaling up end-to-end speech recognition
Awni Y. Hannun
Carl Case
Jared Casper
Bryan Catanzaro
G. Diamos
...
R. Prenger
S. Satheesh
Shubho Sengupta
Adam Coates
A. Ng
195
2,128
0
17 Dec 2014
Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable Images
Anh Totti Nguyen
J. Yosinski
Jeff Clune
AAML
176
3,275
0
05 Dec 2014
Very Deep Convolutional Networks for Large-Scale Image Recognition
Karen Simonyan
Andrew Zisserman
FAtt
MDE
1.7K
100,575
0
04 Sep 2014
Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone
Wenrui Diao
Xiangyu Liu
Zhe Zhou
Kehuan Zhang
90
157
0
18 Jul 2014
Intriguing properties of neural networks
Christian Szegedy
Wojciech Zaremba
Ilya Sutskever
Joan Bruna
D. Erhan
Ian Goodfellow
Rob Fergus
AAML
293
14,978
1
21 Dec 2013
1