Targeted Adversarial Examples for Black Box Audio Systems
☆69Aug 27, 2020Updated 5 years ago
Alternatives and similar repositories for Black-Box-Audio
Users that are interested in Black-Box-Audio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Targeted Adversarial Examples on Speech-to-Text systems☆310Jul 24, 2022Updated 3 years ago
- Robust Audio Adversarial Example for a Physical Attack☆62Nov 13, 2019Updated 6 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- Devil-Whisper-Attack☆37Mar 31, 2025Updated last year
- Adversarial Attacks☆60Mar 22, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- ☆22Apr 3, 2025Updated last year
- ☆10Mar 22, 2022Updated 4 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆28Nov 12, 2019Updated 6 years ago
- Implementation of the Biased Boundary Attack for ImageNet☆21Aug 18, 2019Updated 6 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆35Mar 9, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆33Apr 26, 2020Updated 5 years ago
- This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".☆42Mar 9, 2023Updated 3 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆11Sep 28, 2020Updated 5 years ago
- Implementation of the Boundary Attack algorithm as described in Brendel, Wieland, Jonas Rauber, and Matthias Bethge. "Decision-Based Adve…☆98Dec 12, 2020Updated 5 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks☆169Aug 3, 2021Updated 4 years ago
- A pytorch implementation of MFCC.☆33Jun 1, 2022Updated 3 years ago
- Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)☆178Oct 4, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Code for "Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors"☆13Sep 27, 2018Updated 7 years ago
- Official repository for "Structure-Enhanced Pop Music Generation via Harmony-Aware Learning", ACM MM 2022.☆14Mar 22, 2023Updated 3 years ago
- ☆42May 19, 2023Updated 2 years ago
- One-shot TTS with Improved Unseen Speaker and Style Transfer☆37Mar 2, 2022Updated 4 years ago
- Greedy Adaptive Dictionary (GAD) is a learning algorithm that sets out to find sparse atoms for speech signals.☆11Oct 1, 2018Updated 7 years ago
- ☆86Feb 6, 2021Updated 5 years ago
- Attacking Speaker Recognition with Deep Generative Models☆34Mar 24, 2023Updated 3 years ago
- Develop speaker recognition model based on i-vector using TIMIT database☆16Jul 4, 2019Updated 6 years ago
- PyTorch implementation of " Synthesizing Audio with Generative Adversarial Networks"☆66Jun 8, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An ASR (Automatic Speech Recognition) adversarial attack repository.☆40Nov 7, 2023Updated 2 years ago
- ☆17Sep 25, 2019Updated 6 years ago
- This is the reading list mainly on adversarial examples (attacks, defenses, etc.) I try to keep and update regularly.☆227Oct 7, 2019Updated 6 years ago
- Surrey CVSSP DCASE 2018 Task 2 system☆20Dec 26, 2022Updated 3 years ago
- Robust evasion attacks against neural network to find adversarial examples☆860Jun 1, 2021Updated 4 years ago
- Kalman filtering for speech signal enhancement☆20May 25, 2016Updated 9 years ago
- Codes for reproducing the black-box adversarial attacks in “ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Network…☆63Jun 6, 2019Updated 6 years ago