Pytorch implementation of Backdoor Attack against Speaker Verification
☆28Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for Backdoor-attack-against-speaker-verification
Users that are interested in Backdoor-attack-against-speaker-verification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TDY-CNN for text-independent speaker verification☆19Nov 7, 2022Updated 3 years ago
- ☆11Oct 13, 2022Updated 3 years ago
- Code and data of the ACL 2021 paper "Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution"☆16Jun 29, 2021Updated 4 years ago
- Learning Domain-Invariant Transformation for Speaker Verification.☆11Jun 13, 2023Updated 2 years ago
- Code Implementation for Gotta Catch ’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks☆32Jun 7, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Watermarking LLM papers up-to-date☆11Dec 17, 2023Updated 2 years ago
- ☆15Apr 7, 2023Updated 2 years ago
- ☆82Jun 10, 2024Updated last year
- Code for the paper: "Leveraging speaker attribute information using multi task learning for speaker verification and diarization" present…☆26Oct 5, 2022Updated 3 years ago
- Code for "Label-Consistent Backdoor Attacks"☆57Nov 22, 2020Updated 5 years ago
- [NDSS 2025] Official code for our paper "Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Wate…☆45Nov 5, 2024Updated last year
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- Invisible Backdoor Attack with Sample-Specific Triggers☆106Aug 2, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Jan 4, 2025Updated last year
- Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"☆11Nov 29, 2021Updated 4 years ago
- ☆29Jun 17, 2024Updated last year
- Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection☆11Sep 19, 2023Updated 2 years ago
- A list of backdoor learning resources☆1,163Jul 31, 2024Updated last year
- Pytorch implementation of Extended U-Net for Speaker Verification in Noisy Environments☆28Jul 24, 2023Updated 2 years ago
- Trojan Attack on Neural Network☆190Mar 25, 2022Updated 4 years ago
- ☆19Mar 9, 2024Updated 2 years ago
- ☆32Sep 14, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- ☆12Oct 19, 2020Updated 5 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆15Jun 2, 2022Updated 3 years ago
- ☆15Dec 7, 2023Updated 2 years ago
- ☆11Sep 23, 2020Updated 5 years ago
- Hidden backdoor attack on NLP systems☆46Nov 14, 2021Updated 4 years ago
- Implementation of An Invisible Black-box Backdoor Attack through Frequency Domain☆21Sep 29, 2022Updated 3 years ago
- target speaker verification (tSV), ts-vector, universal speaker verification for single- and multi-talker speech☆15Jan 26, 2021Updated 5 years ago
- Code for Backdoor Attacks Against Dataset Distillation☆37Apr 19, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TrojanZoo is a universal pytorch platform for conducting security researches (especially for backdoor attacks/defenses) for image classif…☆21Jan 7, 2021Updated 5 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- [CVPR 2022] "Quarantine: Sparsity Can Uncover the Trojan Attack Trigger for Free" by Tianlong Chen*, Zhenyu Zhang*, Yihua Zhang*, Shiyu C…☆27Oct 5, 2022Updated 3 years ago
- Code & supplementary material of the paper Label Inference Attacks Against Federated Learning on Usenix Security 2022.☆86Jun 27, 2023Updated 2 years ago
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆33Apr 26, 2020Updated 5 years ago
- ☆26Dec 14, 2021Updated 4 years ago
- [CCS 2021] TSS: Transformation-specific smoothing for robustness certification☆26Oct 3, 2023Updated 2 years ago