Universal Adversarial Audio Perturbations
☆17May 29, 2020Updated 5 years ago
Alternatives and similar repositories for UAP
Users that are interested in UAP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- ICLR 2019 Paper, "Characterizing Audio Adversarial Examples using Temporal Dependency".☆12Apr 3, 2019Updated 7 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- A PyTorch Implementation of the UAP attack☆19Dec 31, 2018Updated 7 years ago
- This is the codebase for defense framework described in USENIX '21 paper "WaveGuard: Understanding and Mitigating Audio Adversarial Examp…☆21Oct 20, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Robust Audio Adversarial Example for a Physical Attack☆62Nov 13, 2019Updated 6 years ago
- Data split we use during the ASVspoof 2019 challenge☆16Nov 28, 2019Updated 6 years ago
- A PyTorch 1.0 implementation of the convolutions described in SincNet☆33Jan 30, 2019Updated 7 years ago
- Devil-Whisper-Attack☆37Mar 31, 2025Updated last year
- Bias Tests for Voice Technologies (bt4vt)☆11Jun 16, 2024Updated last year
- ☆42Sep 9, 2023Updated 2 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- This repository contains the code for the paper "Exploiting Foundation Models and Speech Enhancement for Parkinson's Disease Detection fr…☆12Dec 19, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- code for paper "learning to fool the speaker recognition"☆10Jun 12, 2020Updated 5 years ago
- official implementation of paper ExPO: Explainable Phonetic Trait-Oriented Network for Speaker Verification☆14Mar 14, 2025Updated last year
- Code for "Comparison and Analysis of SampleCNN Architectures for Audio Classification", IEEE Journal of Selected Topics in Signal Process…☆21Nov 18, 2019Updated 6 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 8 years ago
- Implementation of https://arxiv.org/abs/1610.08401 for the CS-E4070 - Special Course in Machine Learning and Data Science: Advanced Topic…☆66Nov 23, 2019Updated 6 years ago
- Ultra-light MIR models with a structured lottery ticket hypothesis approach☆13Sep 21, 2020Updated 5 years ago
- ☆23Apr 3, 2025Updated last year
- Code for IJCAI 2019 paper "Real-time Adversarial Attack".☆20Jul 4, 2020Updated 5 years ago
- AI voicebox on Raspberry Pi☆13Jan 27, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Mar 24, 2023Updated 3 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- Public repo for transferability ICLR 2017 paper☆53Jan 3, 2019Updated 7 years ago
- Detect adversarial images from intermediate features in distance space☆12Aug 22, 2018Updated 7 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Code for paper "Robustness of Bayesian Neural Networks to Gradient-Based Attacks"☆17Feb 26, 2024Updated 2 years ago
- Pytorch implementation of "A Differentiable Perceptual Audio Metric Learned from Just Noticeable Differences", Pranay Manocha et al. - un…☆65Apr 2, 2020Updated 6 years ago
- repository for questions that are asked (or you want answered!) during storytelling sessions☆12Sep 7, 2025Updated 7 months ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆11Apr 19, 2021Updated 5 years ago
- ICASSP 2021 accepted paper☆20May 20, 2021Updated 4 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- ☆15Aug 5, 2020Updated 5 years ago
- WarpRNNT loss ported in Numba CPU/CUDA for Pytorch☆17Mar 11, 2022Updated 4 years ago
- Implementation of ConflictNET: End-to-End Learning for Speech-Based Conflict Intensity Estimation - IEEE Signal Processing Letters☆13Dec 8, 2022Updated 3 years ago