smallflyingpig / universal_adversarial_perturbation_generative_network_for_speaker_recognitionView on GitHub
code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"
☆23Nov 23, 2020Updated 5 years ago
Alternatives and similar repositories for universal_adversarial_perturbation_generative_network_for_speaker_recognition
Users that are interested in universal_adversarial_perturbation_generative_network_for_speaker_recognition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- Ensemble Adversarial Black-Box Attacks against Deep Learning Systems Trained by MNIST, USPS and GTSRB Datasets☆34Dec 16, 2019Updated 6 years ago
- ☆42Sep 9, 2023Updated 2 years ago
- This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".☆42Mar 9, 2023Updated 3 years ago
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ICASSP 2021 accepted paper☆20May 20, 2021Updated 4 years ago
- Implementation of the Biased Boundary Attack for the NeurIPS 2018 Adversarial Vision Challenge☆13Jan 29, 2020Updated 6 years ago
- ☆14Mar 16, 2020Updated 6 years ago
- This is a open resource project for Artificial Intelligence☆13Mar 3, 2019Updated 7 years ago
- MTGAN: Speaker Verification through Multitasking Triplet Generative Adversarial Networks☆19Feb 29, 2020Updated 6 years ago
- Universal Adversarial Networks☆32Jul 30, 2018Updated 7 years ago
- Unsupervised Representation Learning for Singing Voice Separation☆22Feb 10, 2023Updated 3 years ago
- Baselines and Classifiers for speaker anti-spoofing detection☆18Jul 25, 2024Updated last year
- Data split we use during the ASVspoof 2019 challenge☆16Nov 28, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Data independent universal adversarial perturbations☆63Mar 20, 2020Updated 6 years ago
- Dependency graph generator for C++ code.☆19Feb 1, 2019Updated 7 years ago
- Adversarial Attacks☆21Oct 11, 2021Updated 4 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆69Aug 27, 2020Updated 5 years ago
- ☆87Feb 6, 2021Updated 5 years ago
- an implement of asvspoof 2017 using pytorch☆21Jan 8, 2018Updated 8 years ago
- Parse CMake files with Python☆13Mar 16, 2026Updated last week
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Source for paper "Attacking Binarized Neural Networks"☆23Mar 23, 2018Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Targeted Adversarial Examples on Speech-to-Text systems☆309Jul 24, 2022Updated 3 years ago
- Voice Music Separation competing for 6th Huawei Cup in ZJU☆11Jun 2, 2015Updated 10 years ago
- This project is the codes to generate universal adversarial perturbations for EEG-based BCIs.☆11Jul 9, 2020Updated 5 years ago
- A TensorFlow implementation for Synthesizing Robust Adversarial Examples.☆14Oct 4, 2023Updated 2 years ago
- A simple implement of an Adversarial Autoencoding ATN(AAE ATN)☆28Jun 9, 2017Updated 8 years ago
- Code for paper "direct speech-to-image translation"☆26Jun 8, 2020Updated 5 years ago
- Devil-Whisper-Attack☆35Mar 31, 2025Updated 11 months ago
- unofficial implementation of "CPTNN: CROSS-PARALLEL TRANSFORMER NEURAL NETWORK FOR TIME-DOMAIN SPEECH ENHANCEMENT"☆15Nov 14, 2023Updated 2 years ago
- Materials for "Multimedia Deepfake Detection" Tutorial @ ICME 2024☆17Aug 26, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python code to calculate the Mel-frequency Cepstral coefficients (MFCC) and used K-Nearest neighbor comparing with the training set to c…☆10Mar 5, 2014Updated 12 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- An Approximated Gradient Sign Method Using Differential Evolution For Black-box Adversarial Attack☆11Feb 25, 2022Updated 4 years ago
- Audio-only Emotion Detection using Federated Learning☆10Dec 8, 2022Updated 3 years ago
- Fork of cma-es library by Nikolaus Hansen☆12Jul 12, 2017Updated 8 years ago
- Paper implementation for "End-to-end Trained CNN Encoder-Decoder Networks for Image Steganography"☆15Jan 27, 2020Updated 6 years ago
- VectorDefense: Vectorization as a Defense to Adversarial Examples --->☆13May 3, 2018Updated 7 years ago