ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2004.12261
  4. Cited By
Enabling Fast and Universal Audio Adversarial Attack Using Generative
  Model

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model

26 April 2020
Yi Xie
Zhuohang Li
Cong Shi
Jian-Dong Liu
Yingying Chen
Bo Yuan
    AAML
ArXivPDFHTML

Papers citing "Enabling Fast and Universal Audio Adversarial Attack Using Generative Model"

18 / 18 papers shown
Title
Improving Generalization of Universal Adversarial Perturbation via Dynamic Maximin Optimization
Improving Generalization of Universal Adversarial Perturbation via Dynamic Maximin Optimization
Yuyao Zhang
Yingzhe Xu
Junyu Shi
L. Zhang
Shengshan Hu
Minghui Li
Yanjun Zhang
AAML
64
1
0
17 Mar 2025
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Interpretable Spectrum Transformation Attacks to Speaker Recognition
Jiadi Yao
H. Luo
Xiao-Lei Zhang
AAML
37
1
0
21 Feb 2023
Attacks in Adversarial Machine Learning: A Systematic Survey from the
  Life-cycle Perspective
Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective
Baoyuan Wu
Zihao Zhu
Li Liu
Qingshan Liu
Zhaofeng He
Siwei Lyu
AAML
49
21
0
19 Feb 2023
Phonemic Adversarial Attack against Audio Recognition in Real World
Phonemic Adversarial Attack against Audio Recognition in Real World
Jiakai Wang
Zhendong Chen
Zixin Yin
Qinghong Yang
Xianglong Liu
AAML
40
3
0
19 Nov 2022
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker
  Verification
LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker Verification
Xingqi Chen
Jie Wang
Xiaoli Zhang
Weiqiang Zhang
Kunde Yang
AAML
28
7
0
02 Nov 2022
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Symmetric Saliency-based Adversarial Attack To Speaker Identification
Jiadi Yao
Xing Chen
Xiao-Lei Zhang
Weiqiang Zhang
Kunde Yang
AAML
36
8
0
30 Oct 2022
There is more than one kind of robustness: Fooling Whisper with
  adversarial examples
There is more than one kind of robustness: Fooling Whisper with adversarial examples
R. Olivier
Bhiksha Raj
AAML
42
12
0
26 Oct 2022
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact
  DNN
RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
Huy Phan
Cong Shi
Yi Xie
Tian-Di Zhang
Zhuohang Li
Tianming Zhao
Jian-Dong Liu
Yan Wang
Ying-Cong Chen
Bo Yuan
AAML
37
6
0
22 Aug 2022
Towards Understanding and Mitigating Audio Adversarial Examples for
  Speaker Recognition
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Feng Wang
Jiashui Wang
AAML
30
37
0
07 Jun 2022
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker
  Recognition Systems
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
42
18
0
07 Jun 2022
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
aaeCAPTCHA: The Design and Implementation of Audio Adversarial CAPTCHA
Md. Imran Hossen
X. Hei
31
4
0
05 Mar 2022
SEC4SR: A Security Analysis Platform for Speaker Recognition
SEC4SR: A Security Analysis Platform for Speaker Recognition
Guangke Chen
Zhe Zhao
Fu Song
Sen Chen
Lingling Fan
Yang Liu
AAML
35
12
0
04 Sep 2021
SoK: A Modularized Approach to Study the Security of Automatic Speech
  Recognition Systems
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
Yuxuan Chen
Jiangshan Zhang
Xuejing Yuan
Shengzhi Zhang
Kai Chen
Xiaofeng Wang
Shanqing Guo
AAML
44
15
0
19 Mar 2021
A Survey On Universal Adversarial Attack
A Survey On Universal Adversarial Attack
Chaoning Zhang
Philipp Benz
Chenguo Lin
Adil Karjauv
Jing Wu
In So Kweon
AAML
28
90
0
02 Mar 2021
A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale
  Black-Box Optimization
A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization
HanQin Cai
Y. Lou
Daniel McKenzie
W. Yin
34
41
0
21 Feb 2021
Wave-U-Net: A Multi-Scale Neural Network for End-to-End Audio Source
  Separation
Wave-U-Net: A Multi-Scale Neural Network for End-to-End Audio Source Separation
Daniel Stoller
Sebastian Ewert
S. Dixon
AI4TS
104
589
0
08 Jun 2018
Constructing Unrestricted Adversarial Examples with Generative Models
Constructing Unrestricted Adversarial Examples with Generative Models
Yang Song
Rui Shu
Nate Kushman
Stefano Ermon
GAN
AAML
185
302
0
21 May 2018
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
359
5,849
0
08 Jul 2016
1