RiskySignal / Devil-Whisper-AttackView external linksLinks
Devil-Whisper-Attack
☆36Mar 31, 2025Updated 10 months ago
Alternatives and similar repositories for Devil-Whisper-Attack
Users that are interested in Devil-Whisper-Attack are comparing it to the libraries listed below
Sorting:
- Robust Audio Adversarial Example for a Physical Attack☆63Nov 13, 2019Updated 6 years ago
- Adversarial Attacks☆59Mar 22, 2019Updated 6 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆310Jul 24, 2022Updated 3 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- Adversarial Attacks☆21Oct 11, 2021Updated 4 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆12May 6, 2023Updated 2 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- ☆14Mar 16, 2020Updated 5 years ago
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆33Apr 26, 2020Updated 5 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆11Sep 28, 2020Updated 5 years ago
- ☆20Apr 3, 2025Updated 10 months ago
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- Code for the paper "Rethinking Stealthiness of Backdoor Attack against NLP Models" (ACL-IJCNLP 2021)☆24Dec 9, 2021Updated 4 years ago
- Code for the paper "RAP: Robustness-Aware Perturbations for Defending against Backdoor Attacks on NLP Models" (EMNLP 2021)☆25Oct 21, 2021Updated 4 years ago
- ☆88Feb 6, 2021Updated 5 years ago
- Speech Commands Recognition using end-to-end deep learning models in pytorch☆29Oct 8, 2020Updated 5 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆98Oct 18, 2022Updated 3 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆105Nov 18, 2022Updated 3 years ago
- ☆68Sep 29, 2020Updated 5 years ago
- ☆25Nov 21, 2020Updated 5 years ago
- An ASR (Automatic Speech Recognition) adversarial attack repository.☆39Nov 7, 2023Updated 2 years ago
- Tensorflow implementation of Fast Geometrically-Perturbed Adversarial Faces☆27Jan 6, 2022Updated 4 years ago
- Pytorch implementation of conformer with with training script for end-to-end speech recognition on the LibriSpeech dataset.☆28May 1, 2024Updated last year
- [ICLR 2022 official code] Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?☆29Mar 15, 2022Updated 3 years ago
- The implementation of our paper: Composite Adversarial Attacks (AAAI2021)☆30Feb 1, 2022Updated 4 years ago
- ☆12May 6, 2022Updated 3 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- Self-Supervised Speech/Sound Pre-training and Representation Learning Toolkit☆13Nov 18, 2022Updated 3 years ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 4 months ago
- Global Open Simulator☆10May 5, 2025Updated 9 months ago
- Implementation of the paper "Certifiable Robustness and Robust Training for Graph Convolutional Networks".☆43Dec 7, 2020Updated 5 years ago
- CFG explorer for binaries☆39Oct 29, 2024Updated last year
- Hidden backdoor attack on NLP systems☆47Nov 14, 2021Updated 4 years ago
- Pre-Training Buys Better Robustness and Uncertainty Estimates (ICML 2019)☆100Mar 1, 2022Updated 3 years ago
- A united toolbox for running major robustness verification approaches for DNNs. [S&P 2023]☆90Mar 24, 2023Updated 2 years ago
- Code and checkpoints of compressed networks for the paper titled "HYDRA: Pruning Adversarially Robust Neural Networks" (NeurIPS 2020) (ht…☆91Dec 22, 2022Updated 3 years ago
- ☆10Dec 18, 2024Updated last year