Repo for papers to read on adversarial attack and defense techniques in the audio domain.
☆41Dec 6, 2020Updated 5 years ago
Alternatives and similar repositories for Adversarial-Examples-For-Audio-Data
Users that are interested in Adversarial-Examples-For-Audio-Data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆33Apr 26, 2020Updated 5 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆310Jul 24, 2022Updated 3 years ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆14May 6, 2023Updated 2 years ago
- Devil-Whisper-Attack☆37Mar 31, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- Adversarial Attacks☆60Mar 22, 2019Updated 7 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆21Dec 2, 2021Updated 4 years ago
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆14Mar 5, 2026Updated last month
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- Griffin-Lim Like Phase Recovery via Alternating Direction Method of Multipliers (Yoshiki Masuyama et al., 2018)☆14Dec 17, 2018Updated 7 years ago
- ☆17Oct 16, 2024Updated last year
- Inspired work by the project of SER using ELM at Microsoft Research☆19Jul 4, 2018Updated 7 years ago
- Implementation of "Defense against Adversarial Attacks on Audio DeepFake Detection"☆60Oct 20, 2023Updated 2 years ago
- Adversarial attack against DeepSpeech2 ASR pytorch model☆24Jan 15, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆35Dec 16, 2022Updated 3 years ago
- multi-channel target speech extraction with channel decorrelation and target speaker adaptation☆27Feb 19, 2021Updated 5 years ago
- An implementation of the Contrast Predictive Coding (CPC) method to train audio features in an unsupervised fashion.☆10Feb 22, 2022Updated 4 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆35Mar 9, 2020Updated 6 years ago
- Bias Tests for Voice Technologies (bt4vt)☆11Jun 16, 2024Updated last year
- Stochastic Variance Reduced Ensemble Adversarial Attack for Boosting the Adversarial Transferability☆24Oct 16, 2022Updated 3 years ago
- Code for the paper entitled "Physical-Layer Fingerprinting of LoRa devices using Supervised and Zero-Shot Learning".☆25May 31, 2017Updated 8 years ago
- acnn for text-independent speaker recognition☆10Feb 8, 2022Updated 4 years ago
- Advances in audio anti-spoofing and deepfake detection using graph neural networks and self-supervised learning☆23Aug 20, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Dec 22, 2023Updated 2 years ago
- ☆14Feb 22, 2025Updated last year
- Predicting Political Instability and Social Conflicts Using Multimodal Data☆10Jun 6, 2016Updated 9 years ago
- code for our ACM MM 2020 best paper "PiRhDy: Learning Pitch-, Rhythm-, and Dynamics-aware Embeddings for Symbolic Music"☆32Mar 13, 2022Updated 4 years ago
- Code for the paper "Frequency-driven Imperceptible Adversarial Attack on Semantic Similarity"☆60Nov 9, 2023Updated 2 years ago
- code for paper "learning to fool the speaker recognition"☆10Jun 12, 2020Updated 5 years ago
- official implementation of paper ExPO: Explainable Phonetic Trait-Oriented Network for Speaker Verification☆14Mar 14, 2025Updated last year