daniter-cu / AdversarialSpeechView external linksLinks
Fooling neural based speech recognition systems.
☆14Jun 9, 2017Updated 8 years ago
Alternatives and similar repositories for AdversarialSpeech
Users that are interested in AdversarialSpeech are comparing it to the libraries listed below
Sorting:
- ☆36Aug 30, 2019Updated 6 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆70Aug 27, 2020Updated 5 years ago
- Software for psychoacoustics experiments☆25Oct 26, 2024Updated last year
- ☆26Feb 15, 2023Updated 3 years ago
- libdft for win☆52Jul 8, 2013Updated 12 years ago
- ☆12Jul 25, 2018Updated 7 years ago
- ☆10Updated this week
- Visualizing malware behavior, and proactive protection using GANs against zero-day attacks.☆41Jul 29, 2018Updated 7 years ago
- https://icml.cc/virtual/2023/poster/24354☆10Aug 15, 2023Updated 2 years ago
- Official Pytorch Implementation for Continual Learning For On-Device Environmental Sound Classification☆14Jul 19, 2022Updated 3 years ago
- Simple filter Equalizer lowpass, highpass, bandpass and bandstop☆11Apr 7, 2020Updated 5 years ago
- Devil-Whisper-Attack☆36Mar 31, 2025Updated 10 months ago
- [EMNLP 2025 Oral] IPIGuard: A Novel Tool Dependency Graph-Based Defense Against Indirect Prompt Injection in LLM Agents☆16Sep 16, 2025Updated 4 months ago
- ☆10Jun 23, 2018Updated 7 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- A python implementation of the paper "GraRep: Learning Graph Representations with Global Structural Information".☆11Jun 7, 2017Updated 8 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Causal Reasoning for Membership Inference Attacks☆11Oct 21, 2022Updated 3 years ago
- This work corroborates a run-time Trojan detection method exploiting STRong Intentional Perturbation of inputs, is a multi-domain Trojan …☆10Mar 7, 2021Updated 4 years ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- crawling china stock recommendation from Sina Weibo, create pyecharts for data☆11Jan 26, 2018Updated 8 years ago
- https://youtu.be/pE7UOYioPKk☆10Feb 16, 2023Updated 2 years ago
- ☆18Aug 23, 2025Updated 5 months ago
- calculate bhattacharyya distance based on zero cross rate feature between different Gaussian model for speech emotion recognition. corpus…☆11Oct 17, 2018Updated 7 years ago
- ☆12Nov 14, 2023Updated 2 years ago
- Code for the paper "Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction" …☆12Sep 6, 2023Updated 2 years ago
- 🍙将日语转换成汉语的读法。空耳~~~☆11Oct 30, 2019Updated 6 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- ☆10Jul 5, 2016Updated 9 years ago
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- Forward-looking approach in process mining (using system dynamics and process mining to simulate business processes)☆12Feb 16, 2023Updated 2 years ago
- 一款模仿bugscan的扫描器☆10Mar 22, 2018Updated 7 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Attacks using out-of-distribution adversarial examples☆11Nov 19, 2019Updated 6 years ago
- An unofficial implementation of AutoDAN attack on LLMs (arXiv:2310.15140)☆45Feb 8, 2024Updated 2 years ago
- Resillent Control-Flow Attestation☆13Sep 30, 2021Updated 4 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Code and data for automatic paraphrase dataset augmentation.☆11Mar 8, 2021Updated 4 years ago
- POS tagging models for Hindi English Code Mixed Tweets☆11Aug 1, 2018Updated 7 years ago