☆12Nov 30, 2021Updated 4 years ago
Alternatives and similar repositories for dompteur
Users that are interested in dompteur are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 6, 2025Updated last year
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- Runflow is a tool to define and run workflows.☆11Jul 13, 2021Updated 4 years ago
- Code of paper "AdvReverb: AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception"☆20Nov 26, 2023Updated 2 years ago
- Defending against Adversarial Audio via Diffusion Model (ICLR 2023)☆35Mar 2, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The official implementation of the paper "Defending Your Voice: Adversarial Attack on Voice Conversion".☆52May 15, 2024Updated last year
- [CCS-LAMPS 2024] Mitigating Unauthorized Speech Synthesis for Voice Protection☆20Nov 1, 2024Updated last year
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆45Nov 20, 2024Updated last year
- ☆21Sep 17, 2024Updated last year
- ☆24Dec 20, 2022Updated 3 years ago
- [InterSpeech'2023] "Betray Oneself: A Novel Audio DeepFake Detection Model via Mono-to-Stereo Conversion"☆13Mar 14, 2024Updated 2 years ago
- ☆14Aug 19, 2024Updated last year
- A Concretely Efficient Hierarchical Oblivious RAM☆14Nov 6, 2023Updated 2 years ago
- Implementation of Research Paper titled: An explainable AI based Intrusion Detection System for DNS over HTTPS (DoH) Attacks on CICIDS da…☆11Jul 11, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆22Mar 20, 2023Updated 3 years ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- [USENIX Security 2025] SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis☆33May 24, 2025Updated 11 months ago
- **ICASSP 2022** 《Toward Degradation-Robust Voice Conversion》Using speech enhancement and end-to-end denoising training to improve degrada…☆24Sep 27, 2022Updated 3 years ago
- WebCruiserWVS 轻量级基于C#的扫描器,椰树扫描器的前身☆11Apr 18, 2018Updated 8 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- A simple compiler for SysY (tiny C). Based on Bison, LLVM.☆10Dec 24, 2024Updated last year
- Adversarial Augmentation Against Adversarial Attacks☆32May 23, 2023Updated 2 years ago
- A CNN for denoising speech.☆16Jun 2, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- ☆11Apr 7, 2026Updated 3 weeks ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Advances in audio anti-spoofing and deepfake detection using graph neural networks and self-supervised learning☆23Aug 20, 2023Updated 2 years ago
- High accuracy code-switching whisper / qwen3 transcription☆27Apr 20, 2026Updated last week
- AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. I…☆11Nov 21, 2023Updated 2 years ago
- Whispers in the Machine: Confidentiality in Agentic Systems☆44Apr 20, 2026Updated last week
- A high-throughput oblivious storage system☆28May 31, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Implementation of a differentially private generative adversarial network.☆11Nov 20, 2018Updated 7 years ago
- Demo for DART, Audio Imagination workshop submission in NeurIPS 2024☆13Apr 22, 2026Updated last week
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Prepend universal audio attack segment to mute Whisper☆39Jan 22, 2025Updated last year
- Please visit https://thuhcsi.github.io/SnakeGAN/☆37Apr 25, 2023Updated 3 years ago
- Per-pixel lighting effects in a 2D environment☆10Sep 13, 2019Updated 6 years ago
- ☆12Oct 13, 2022Updated 3 years ago