Repo for papers to read on adversarial attack and defense techniques in the audio domain.
☆41Dec 6, 2020Updated 5 years ago
Alternatives and similar repositories for Adversarial-Examples-For-Audio-Data
Users that are interested in Adversarial-Examples-For-Audio-Data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆34Apr 26, 2020Updated 6 years ago
- Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system☆15May 6, 2023Updated 2 years ago
- Devil-Whisper-Attack☆37Mar 31, 2025Updated last year
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆45Nov 20, 2024Updated last year
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆42Sep 9, 2023Updated 2 years ago
- Codebase for the paper "Adversarial Attacks on Time Series"☆24Mar 26, 2019Updated 7 years ago
- SA-toolkit: Speaker speech anonymization toolkit in python☆32Sep 18, 2025Updated 7 months ago
- Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆21Dec 2, 2021Updated 4 years ago
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- Griffin-Lim Like Phase Recovery via Alternating Direction Method of Multipliers (Yoshiki Masuyama et al., 2018)☆14Dec 17, 2018Updated 7 years ago
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆15Mar 5, 2026Updated last month
- ☆17Oct 16, 2024Updated last year
- Inspired work by the project of SER using ELM at Microsoft Research☆19Jul 4, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Implementation of "Defense against Adversarial Attacks on Audio DeepFake Detection"☆60Oct 20, 2023Updated 2 years ago
- Adversarial attack against DeepSpeech2 ASR pytorch model☆24Jan 15, 2021Updated 5 years ago
- ☆35Dec 16, 2022Updated 3 years ago
- multi-channel target speech extraction with channel decorrelation and target speaker adaptation☆27Feb 19, 2021Updated 5 years ago
- An implementation of the Contrast Predictive Coding (CPC) method to train audio features in an unsupervised fashion.☆10Feb 22, 2022Updated 4 years ago
- Tutorial about noisy labels for SIBGRAPI 2020☆11Nov 6, 2020Updated 5 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆35Mar 9, 2020Updated 6 years ago
- Neural Synchronization: A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication☆19Nov 22, 2024Updated last year
- Device Authentication for Wi-Fi Based on Deep Learning and Radio Frequency Fingerprint☆14Aug 26, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Code for the paper entitled "Physical-Layer Fingerprinting of LoRa devices using Supervised and Zero-Shot Learning".☆25May 31, 2017Updated 8 years ago
- acnn for text-independent speaker recognition☆10Feb 8, 2022Updated 4 years ago
- Advances in audio anti-spoofing and deepfake detection using graph neural networks and self-supervised learning☆23Aug 20, 2023Updated 2 years ago
- ☆10Dec 22, 2023Updated 2 years ago
- ☆23Sep 8, 2025Updated 7 months ago
- ☆14Feb 22, 2025Updated last year
- Predicting Political Instability and Social Conflicts Using Multimodal Data☆10Jun 6, 2016Updated 9 years ago