Fooling neural based speech recognition systems.
☆14Jun 9, 2017Updated 8 years ago
Alternatives and similar repositories for AdversarialSpeech
Users that are interested in AdversarialSpeech are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Aug 30, 2019Updated 6 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆69Aug 27, 2020Updated 5 years ago
- Software for psychoacoustics experiments☆25Oct 26, 2024Updated last year
- PEZ Dispenser Extension for Stable-Diffusion-WebUI☆19Oct 13, 2025Updated 5 months ago
- ☆14Mar 16, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Devil-Whisper-Attack☆35Mar 31, 2025Updated 11 months ago
- Convert kaldi feature extraction and nnet3 models into Tensorflow Lite models. Currently aimed at converting kaldi's x-vector models and …☆20Oct 6, 2022Updated 3 years ago
- Robust Audio Adversarial Example for a Physical Attack☆62Nov 13, 2019Updated 6 years ago
- Adversarial Attacks☆60Mar 22, 2019Updated 7 years ago
- An unofficial implementation of AutoDAN attack on LLMs (arXiv:2310.15140)☆45Feb 8, 2024Updated 2 years ago
- libdft for win☆51Jul 8, 2013Updated 12 years ago
- Recurrent neural network for audio noise reduction☆12Aug 18, 2022Updated 3 years ago
- ☆13Sep 12, 2017Updated 8 years ago
- GRIN is a proposed standard graph retrieval interface in GraphScope.☆16Mar 25, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- ☆19Oct 23, 2023Updated 2 years ago
- ☆26Feb 15, 2023Updated 3 years ago
- TTS inference in C++ based on TFlite model☆20Jan 18, 2021Updated 5 years ago
- C++版本的汉字转拼音 Transfer chinese character to pinyin☆15Aug 31, 2018Updated 7 years ago
- 🍙将日语转换成汉语的读法。空耳~~~☆11Oct 30, 2019Updated 6 years ago
- A rainbow table implementation for non-uniform inputs, such as phone numbers.☆26Jan 4, 2022Updated 4 years ago
- Speech recognition with federated learning☆11Jan 9, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆12May 6, 2020Updated 5 years ago
- ☆26Nov 2, 2022Updated 3 years ago
- ☆10Jun 23, 2018Updated 7 years ago
- Learning to Cluster☆12Apr 17, 2018Updated 7 years ago
- https://youtu.be/pE7UOYioPKk☆10Feb 16, 2023Updated 3 years ago
- No.3 solution of Tianchi ImageNet Adversarial Attack Challenge.☆12Apr 22, 2020Updated 5 years ago
- ☆28May 28, 2023Updated 2 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆309Jul 24, 2022Updated 3 years ago
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆40Jul 29, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆12Sep 26, 2019Updated 6 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Turns virtual usbredir connections into physical ones☆14Jun 17, 2020Updated 5 years ago
- ☆10Jul 5, 2016Updated 9 years ago
- ☆16Aug 13, 2024Updated last year
- Official Pytorch Implementation for Continual Learning For On-Device Environmental Sound Classification☆14Jul 19, 2022Updated 3 years ago
- ☆10Updated this week