Devil-Whisper-Attack
☆37Mar 31, 2025Updated last year
Alternatives and similar repositories for Devil-Whisper-Attack
Users that are interested in Devil-Whisper-Attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robust Audio Adversarial Example for a Physical Attack☆62Nov 13, 2019Updated 6 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆69Aug 27, 2020Updated 5 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆311Jul 24, 2022Updated 3 years ago
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆15May 6, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- ☆10Mar 22, 2022Updated 4 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Adversarial Attacks☆21Oct 11, 2021Updated 4 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆34Apr 26, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for "PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier"☆46May 17, 2023Updated 2 years ago
- ☆14Apr 6, 2025Updated last year
- An ASR (Automatic Speech Recognition) adversarial attack repository.☆41Nov 7, 2023Updated 2 years ago
- The official repository of 'Unnatural Language Are Not Bugs but Features for LLMs'☆24May 20, 2025Updated 11 months ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆15Jun 2, 2022Updated 3 years ago
- The official code to reproduce results from the NACCL2019 paper: White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks☆12Jun 4, 2019Updated 6 years ago
- Speech Commands Recognition using end-to-end deep learning models in pytorch☆28Oct 8, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- WeNet 实战课程作业☆20Oct 7, 2022Updated 3 years ago
- An implementation of the Contrast Predictive Coding (CPC) method to train audio features in an unsupervised fashion.☆10Feb 22, 2022Updated 4 years ago
- Implementation of AugMix (2020) in TensorFlow☆16May 27, 2022Updated 3 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- This repo keeps track of popular provable training and verification approaches towards robust neural networks, including leaderboards on …☆96Oct 18, 2022Updated 3 years ago
- Advances in audio anti-spoofing and deepfake detection using graph neural networks and self-supervised learning☆23Aug 20, 2023Updated 2 years ago
- PyTorch implementation of " Synthesizing Audio with Generative Adversarial Networks"☆65Jun 8, 2020Updated 5 years ago
- Panopticon is a complete in-DRAM RowHammer mitigation. This code simulates an implementation of Panopticon in DDR5.☆14Jun 2, 2023Updated 2 years ago
- A NVIDIA's Pytorch Tacotron2 adaptation with unsupervised Global Style Tokens. The model has been trained with the English read-speech LJ…☆10Sep 4, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Pytorch implementation of conformer with with training script for end-to-end speech recognition on the LibriSpeech dataset.☆29May 1, 2024Updated 2 years ago
- ☆19Oct 24, 2024Updated last year
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- CLIP-Guided Object Restoration for Defense Against 3D Point Cloud Backdoor Attacks☆19Nov 28, 2024Updated last year
- Repository for author masking☆13Oct 29, 2018Updated 7 years ago
- ☆12Mar 24, 2023Updated 3 years ago
- ☆11Jul 14, 2023Updated 2 years ago