ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1903.10346
  4. Cited By
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic
  Speech Recognition

Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition

22 March 2019
Yao Qin
Nicholas Carlini
Ian Goodfellow
G. Cottrell
Colin Raffel
    AAML
ArXivPDFHTML

Papers citing "Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition"

24 / 174 papers shown
Title
Adversarial Ranking Attack and Defense
Adversarial Ranking Attack and Defense
Mo Zhou
Zhenxing Niu
Le Wang
Qilin Zhang
G. Hua
36
38
0
26 Feb 2020
Gödel's Sentence Is An Adversarial Example But Unsolvable
Gödel's Sentence Is An Adversarial Example But Unsolvable
Xiaodong Qi
Lansheng Han
AAML
20
0
0
25 Feb 2020
Identifying Audio Adversarial Examples via Anomalous Pattern Detection
Identifying Audio Adversarial Examples via Anomalous Pattern Detection
Victor Akinwande
C. Cintas
Skyler Speakman
Srihari Sridharan
AAML
12
16
0
13 Feb 2020
Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to
  Adversarial Examples
Adversarial Deepfakes: Evaluating Vulnerability of Deepfake Detectors to Adversarial Examples
Shehzeen Samarah Hussain
Paarth Neekhara
Malhar Jere
F. Koushanfar
Julian McAuley
AAML
6
150
0
09 Feb 2020
Tiny noise, big mistakes: Adversarial perturbations induce errors in
  Brain-Computer Interface spellers
Tiny noise, big mistakes: Adversarial perturbations induce errors in Brain-Computer Interface spellers
Xiao Zhang
Dongrui Wu
L. Ding
Hanbin Luo
Chin-Teng Lin
T. Jung
Ricardo Chavarriaga
AAML
17
59
0
30 Jan 2020
Massif: Interactive Interpretation of Adversarial Attacks on Deep
  Learning
Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning
Nilaksh Das
Haekyu Park
Zijie J. Wang
Fred Hohman
Robert Firstman
Emily Rogers
Duen Horng Chau
AAML
19
7
0
21 Jan 2020
Advbox: a toolbox to generate adversarial examples that fool neural
  networks
Advbox: a toolbox to generate adversarial examples that fool neural networks
Dou Goodman
Xin Hao
Yang Wang
Yuesheng Wu
Junfeng Xiong
Huan Zhang
AAML
15
53
0
13 Jan 2020
Malware Makeover: Breaking ML-based Static Analysis by Modifying
  Executable Bytes
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
Keane Lucas
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
S. Shintre
AAML
31
66
0
19 Dec 2019
$n$-ML: Mitigating Adversarial Examples via Ensembles of Topologically
  Manipulated Classifiers
nnn-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers
Mahmood Sharif
Lujo Bauer
Michael K. Reiter
AAML
16
6
0
19 Dec 2019
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
AAML
17
193
0
03 Nov 2019
Adversarial Music: Real World Audio Adversary Against Wake-word
  Detection System
Adversarial Music: Real World Audio Adversary Against Wake-word Detection System
Juncheng Billy Li
Shuhui Qu
Xinjian Li
Joseph Szurley
J. Zico Kolter
Florian Metze
AAML
10
63
0
31 Oct 2019
SPARK: Spatial-aware Online Incremental Attack Against Visual Tracking
SPARK: Spatial-aware Online Incremental Attack Against Visual Tracking
Qing-Wu Guo
Xiaofei Xie
Felix Juefei-Xu
L. Ma
Zhongguo Li
Wanli Xue
Wei Feng
Yang Liu
AAML
19
4
0
19 Oct 2019
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box
  Attacks on Speech Recognition and Voice Identification Systems
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
H. Abdullah
Muhammad Sajidur Rahman
Washington Garcia
Logan Blue
Kevin Warren
Anurag Swarnim Yadav
T. Shrimpton
Patrick Traynor
AAML
17
87
0
11 Oct 2019
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained
  Environments
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments
Alesia Chernikova
Alina Oprea
AAML
16
35
0
23 Sep 2019
Universal Adversarial Audio Perturbations
Universal Adversarial Audio Perturbations
Sajjad Abdoli
L. G. Hafemann
Jérôme Rony
Ismail Ben Ayed
P. Cardinal
Alessandro Lameiras Koerich
AAML
25
51
0
08 Aug 2019
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech
  Recognition Systems
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems
Lea Schonherr
Thorsten Eisenhofer
Steffen Zeiler
Thorsten Holz
D. Kolossa
AAML
46
63
0
05 Aug 2019
Sound source detection, localization and classification using
  consecutive ensemble of CRNN models
Sound source detection, localization and classification using consecutive ensemble of CRNN models
Slawomir Kapka
M. Lewandowski
16
66
0
02 Aug 2019
Structure-Invariant Testing for Machine Translation
Structure-Invariant Testing for Machine Translation
Pinjia He
Clara Meister
Z. Su
27
104
0
19 Jul 2019
Adversarial attacks on Copyright Detection Systems
Adversarial attacks on Copyright Detection Systems
Parsa Saadatpanah
Ali Shafahi
Tom Goldstein
AAML
6
33
0
17 Jun 2019
Perceptual Based Adversarial Audio Attacks
Perceptual Based Adversarial Audio Attacks
Joseph Szurley
J. Zico Kolter
AAML
24
25
0
14 Jun 2019
Real-Time Adversarial Attacks
Real-Time Adversarial Attacks
Yuan Gong
Boyang Li
C. Poellabauer
Yiyu Shi
AAML
11
55
0
31 May 2019
Weighted-Sampling Audio Adversarial Example Attack
Weighted-Sampling Audio Adversarial Example Attack
Xiaolei Liu
Xiaosong Zhang
Kun Wan
Qingxin Zhu
Yufei Ding
DiffM
AAML
33
36
0
26 Jan 2019
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia
  Classification System
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System
Huangxun Chen
Chenyu Huang
Qianyi Huang
Qian Zhang
Wei Wang
AAML
28
26
0
12 Jan 2019
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
287
5,837
0
08 Jul 2016
Previous
1234