Devil-Whisper-Attack
☆37Mar 31, 2025Updated last year
Alternatives and similar repositories for Devil-Whisper-Attack
Users that are interested in Devil-Whisper-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robust Audio Adversarial Example for a Physical Attack☆62Nov 13, 2019Updated 6 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆69Aug 27, 2020Updated 5 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆310Jul 24, 2022Updated 3 years ago
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆14May 6, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- ☆10Mar 22, 2022Updated 4 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Adversarial Attacks☆21Oct 11, 2021Updated 4 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆11Sep 28, 2020Updated 5 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- ☆22Apr 3, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆34Apr 26, 2020Updated 5 years ago
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- ☆14Apr 6, 2025Updated last year
- An ASR (Automatic Speech Recognition) adversarial attack repository.☆41Nov 7, 2023Updated 2 years ago
- The official repository of 'Unnatural Language Are Not Bugs but Features for LLMs'☆24May 20, 2025Updated 10 months ago
- ☆16Oct 18, 2023Updated 2 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆15Jun 2, 2022Updated 3 years ago
- Speech Commands Recognition using end-to-end deep learning models in pytorch☆28Oct 8, 2020Updated 5 years ago
- ☆86Feb 6, 2021Updated 5 years ago
- Implementation of AugMix (2020) in TensorFlow☆16May 27, 2022Updated 3 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆97Oct 18, 2022Updated 3 years ago
- Advances in audio anti-spoofing and deepfake detection using graph neural networks and self-supervised learning☆23Aug 20, 2023Updated 2 years ago
- PyTorch implementation of " Synthesizing Audio with Generative Adversarial Networks"☆66Jun 8, 2020Updated 5 years ago
- Pytorch implementation of conformer with with training script for end-to-end speech recognition on the LibriSpeech dataset.☆29May 1, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CROWN: A Neural Network Verification Framework for Networks with General Activation Functions☆39Dec 13, 2018Updated 7 years ago
- ☆20Oct 24, 2024Updated last year
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- CLIP-Guided Object Restoration for Defense Against 3D Point Cloud Backdoor Attacks☆19Nov 28, 2024Updated last year
- official implementation of paper ExPO: Explainable Phonetic Trait-Oriented Network for Speaker Verification☆14Mar 14, 2025Updated last year
- Repository for author masking☆13Oct 29, 2018Updated 7 years ago
- My entry for ICLR 2018 Reproducibility Challenge for paper Synthesizing robust adversarial examples https://openreview.net/pdf?id=BJDH5M-…☆73Apr 5, 2018Updated 8 years ago