Pytorch implementation of Backdoor Attack against Speaker Verification
☆28Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for Backdoor-attack-against-speaker-verification
Users that are interested in Backdoor-attack-against-speaker-verification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Oct 13, 2022Updated 3 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Jun 29, 2021Updated 4 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆33Jun 7, 2022Updated 3 years ago
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- ☆15Apr 7, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆82Jun 10, 2024Updated last year
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- ☆14Jan 4, 2025Updated last year
- ☆29Jun 17, 2024Updated last year
- A list of backdoor learning resources☆1,163Jul 31, 2024Updated last year
- Trojan Attack on Neural Network☆190Mar 25, 2022Updated 4 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- [CVPR 2023] The official implementation of our CVPR 2023 paper "Detecting Backdoors During the Inference Stage Based on Corruption Robust…☆25May 25, 2023Updated 2 years ago
- ☆32Sep 14, 2022Updated 3 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆15Jun 2, 2022Updated 3 years ago
- ☆15Dec 7, 2023Updated 2 years ago
- Implementation for Poison Attacks against Text Datasets with Conditional Adversarially Regularized Autoencoder (EMNLP-Findings 2020)☆15Oct 8, 2020Updated 5 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- Hidden backdoor attack on NLP systems☆46Nov 14, 2021Updated 4 years ago
- target speaker verification (tSV), ts-vector, universal speaker verification for single- and multi-talker speech☆15Jan 26, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for Backdoor Attacks Against Dataset Distillation☆37Apr 19, 2023Updated 3 years ago
- [ICLR 2025] Official implementation of 'Hidden in the Noise: Two-Stage Robust Watermarking for Images'☆13May 5, 2025Updated 11 months ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- ☆27Feb 1, 2023Updated 3 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆87Jun 27, 2023Updated 2 years ago
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆34Apr 26, 2020Updated 5 years ago
- ☆26Dec 14, 2021Updated 4 years ago
- [CCS 2021] TSS: Transformation-specific smoothing for robustness certification☆26Oct 3, 2023Updated 2 years ago
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- AC Optimal Power Flow (OPF) attempts to determine the setpoints of generators that would minimize the operating cost of a power system wh…☆16Jul 30, 2024Updated last year
- ☆18Jul 1, 2021Updated 4 years ago
- This is the code for our paper `Robust Federated Learning with Attack-Adaptive Aggregation' accepted by FTL-IJCAI'21.☆47Jun 12, 2023Updated 2 years ago
- ☆19Jan 5, 2020Updated 6 years ago
- Craft poisoned data using MetaPoison☆54Apr 5, 2021Updated 5 years ago
- Defending against Adversarial Audio via Diffusion Model (ICLR 2023)☆35Mar 2, 2023Updated 3 years ago
- ☆23Aug 24, 2020Updated 5 years ago