KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems
☆20Oct 3, 2023Updated 2 years ago
Alternatives and similar repositories for KENKU
Users that are interested in KENKU are comparing it to the libraries listed below
Sorting:
- Code of paper "AdvReverb: AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception"☆18Nov 26, 2023Updated 2 years ago
- Reproduction of paper Void: A Fast and Light Voice Liveness Detection System☆19Aug 19, 2020Updated 5 years ago
- Adversarial attack against DeepSpeech2 ASR pytorch model☆25Jan 15, 2021Updated 5 years ago
- ☆26Dec 1, 2022Updated 3 years ago
- This is the pytorch implementation of our work titled "An Efficient Temporary Deepfake Location Approach Based Embeddings for Partially S…☆21Nov 2, 2024Updated last year
- Robust Audio Adversarial Example for a Physical Attack☆63Nov 13, 2019Updated 6 years ago
- ☆224Aug 17, 2025Updated 6 months ago
- ☆23Jun 19, 2025Updated 8 months ago
- ☆14May 17, 2024Updated last year
- BiasFinder | IEEE TSE | Metamorphic Test Generation to Uncover Bias for Sentiment Analysis Systems☆11Jan 18, 2022Updated 4 years ago
- AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. I…☆11Nov 21, 2023Updated 2 years ago
- ☆15Feb 25, 2023Updated 3 years ago
- Per-pixel lighting effects in a 2D environment☆10Sep 13, 2019Updated 6 years ago
- ☆10Oct 18, 2021Updated 4 years ago
- ☆14Dec 18, 2024Updated last year
- Efficient Adversarial Attack Strategy Against 3D Object Detection in Autonomous Driving Systems☆38Oct 7, 2025Updated 5 months ago
- This repository contains the implementation of DPMLBench: Holistic Evaluation of Differentially Private Machine Learning☆11Nov 24, 2023Updated 2 years ago
- [InterSpeech'2023] "Betray Oneself: A Novel Audio DeepFake Detection Model via Mono-to-Stereo Conversion"☆13Mar 14, 2024Updated last year
- LLM-based mutation testing☆14Feb 3, 2025Updated last year
- ☆10Mar 22, 2022Updated 3 years ago
- ☆16Dec 11, 2023Updated 2 years ago
- Code and data for PAN and PAN-phys.☆13Mar 20, 2023Updated 2 years ago
- Linear algebra-based Proof of Retrievability protocol for ensuring data integrity☆14Mar 28, 2022Updated 3 years ago
- Membership Inference Attack on Federated Learning☆12Jan 14, 2022Updated 4 years ago
- Code and full version of the paper "Hijacking Attacks against Neural Network by Analyzing Training Data"☆14Feb 28, 2024Updated 2 years ago
- ☆14Apr 11, 2024Updated last year
- Code for the DP cross-silo federated learning paper☆11Jul 10, 2020Updated 5 years ago
- ☆14May 25, 2022Updated 3 years ago
- Official code for Generative Fractional Diffusion Models☆16Jan 16, 2025Updated last year
- ☆12Nov 30, 2021Updated 4 years ago
- Open-source codes for paper "Malicious Agent Detection for Robust Multi-Agent Collaborative Perception"☆15Jul 8, 2024Updated last year
- Code release for DeepJudge (S&P'22)☆52Mar 14, 2023Updated 2 years ago
- ☆16Oct 18, 2023Updated 2 years ago
- ☆13May 17, 2025Updated 9 months ago
- Federated Learning in Network Intrusion Detection☆14Feb 22, 2023Updated 3 years ago
- ☆14Apr 6, 2025Updated 11 months ago
- Automatically exported from code.google.com/p/provable-data-possession☆14Oct 19, 2015Updated 10 years ago
- ☆17Feb 7, 2024Updated 2 years ago
- NN-EMD framework: efficiently training neural networks using encrypted multi-sourced datasets☆14Jun 6, 2021Updated 4 years ago