ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1904.03829
  4. Cited By
Adversarial Audio: A New Information Hiding Method and Backdoor for
  DNN-based Speech Recognition Models

Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models

8 April 2019
Yehao Kong
Jiliang Zhang
ArXivPDFHTML

Papers citing "Adversarial Audio: A New Information Hiding Method and Backdoor for DNN-based Speech Recognition Models"

7 / 7 papers shown
Title
Sample-Independent Federated Learning Backdoor Attack in Speaker Recognition
Sample-Independent Federated Learning Backdoor Attack in Speaker Recognition
Weida Xu
Yang Xu
Sicong Zhang
FedML
AAML
44
0
0
25 Aug 2024
Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation
  for Embedding Undetectable Vulnerabilities on Speech Recognition
Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition
Wenhan Yao
Jiangkun Yang
yongqiang He
Jia Liu
Weiping Wen
54
1
0
16 Jun 2024
Towards Stealthy Backdoor Attacks against Speech Recognition via
  Elements of Sound
Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Hanbo Cai
Pengcheng Zhang
Hai Dong
Yan Xiao
Stefanos Koffas
Yiming Li
AAML
31
28
0
17 Jul 2023
BadRes: Reveal the Backdoors through Residual Connection
BadRes: Reveal the Backdoors through Residual Connection
Min He
Tianyu Chen
Haoyi Zhou
Shanghang Zhang
Jianxin Li
24
0
0
15 Sep 2022
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
39
15
0
19 Mar 2021
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive
  Review
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Yansong Gao
Bao Gia Doan
Zhi-Li Zhang
Siqi Ma
Jiliang Zhang
Anmin Fu
Surya Nepal
Hyoungshick Kim
AAML
36
221
0
21 Jul 2020
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
326
5,847
0
08 Jul 2016
1