☆36Aug 30, 2019Updated 6 years ago
Alternatives and similar repositories for adversarial_audio
Users that are interested in adversarial_audio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Targeted Adversarial Examples for Black Box Audio Systems☆69Aug 27, 2020Updated 5 years ago
- Fooling neural based speech recognition systems.☆14Jun 9, 2017Updated 8 years ago
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆311Jul 24, 2022Updated 3 years ago
- Robust Audio Adversarial Example for a Physical Attack☆62Nov 13, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆35Mar 9, 2020Updated 6 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- A pytorch implementation of MFCC.☆33Jun 1, 2022Updated 3 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- Devil-Whisper-Attack☆37Mar 31, 2025Updated last year
- Targeted Adversarial Examples on Speech-to-Text systems☆11Sep 28, 2020Updated 5 years ago
- ☆42Jan 17, 2021Updated 5 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".☆42Mar 9, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Adversarial Attacks☆21Oct 11, 2021Updated 4 years ago
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- Code and data for the ICLR 2021 paper "Perceptual Adversarial Robustness: Defense Against Unseen Threat Models".☆56Jan 18, 2022Updated 4 years ago
- HGFM : A Hierarchical Grained and Feature Model for Acoustic Emotion Recgnition☆11Oct 30, 2020Updated 5 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆99Dec 12, 2020Updated 5 years ago
- ☆27Jun 5, 2024Updated last year
- Speech Commands Recognition using end-to-end deep learning models in pytorch☆28Oct 8, 2020Updated 5 years ago
- Adversarial Examples on KNN (and its neural network friends)☆19Mar 19, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11May 9, 2022Updated 3 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- Emotional Speech Conversion using Nonparallel Data☆17Apr 10, 2019Updated 7 years ago
- ☆13Jun 15, 2021Updated 4 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 5 years ago
- ☆14Jan 2, 2025Updated last year
- Meta-Learning for End-to-End ASR☆10Aug 8, 2020Updated 5 years ago
- Black-Box Ripper: Copying black-box models using generative evolutionary algorithms - NIPS 2020 - Official Implementation☆29Oct 25, 2020Updated 5 years ago
- acnn for text-independent speaker recognition☆10Feb 8, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆34Apr 26, 2020Updated 6 years ago
- Differentiable Mean Opinion Score Regularization for Perceptual Speech Enhancement☆25Apr 16, 2023Updated 3 years ago
- Bad Characters: Imperceptible NLP Attacks