zhenghuatan / Audio-adversarial-examplesView external linksLinks
Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system
☆12May 6, 2023Updated 2 years ago
Alternatives and similar repositories for Audio-adversarial-examples
Users that are interested in Audio-adversarial-examples are comparing it to the libraries listed below
Sorting:
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- デジモンバイタルブレス/DIGIMON VITAL BRACELET DiM CARD Flash☆10May 12, 2021Updated 4 years ago
- Text to audio with Tik-Tok Voices☆13Apr 6, 2023Updated 2 years ago
- Devil-Whisper-Attack☆36Mar 31, 2025Updated 10 months ago
- 工业级中文语音识别系统电子书☆13Oct 30, 2020Updated 5 years ago
- Record my learning progress.☆10Mar 1, 2022Updated 3 years ago
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- ☆14Feb 22, 2025Updated 11 months ago
- ☆10Dec 22, 2023Updated 2 years ago
- Generate images of Chinese license plates☆11Feb 8, 2021Updated 5 years ago
- A notes application with Registration, Authentication, and Realtime Crud☆11Jun 22, 2023Updated 2 years ago
- Codes and data for KDD 2024 Research Track paper "ProCom: A Few-shot Targeted Community Detection Algorithm"☆11Aug 15, 2024Updated last year
- ☆10Jan 31, 2022Updated 4 years ago
- ☆10Mar 22, 2022Updated 3 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- Panopticon is a complete in-DRAM RowHammer mitigation. This code simulates an implementation of Panopticon in DDR5.☆14Jun 2, 2023Updated 2 years ago
- ☆19Oct 24, 2024Updated last year
- ☆11Apr 23, 2020Updated 5 years ago
- ☆16Aug 31, 2021Updated 4 years ago
- (ICLR 2025) Multi-Task Corrupted Prediction for Learning Robust Audio-Visual Speech Representation☆15Apr 29, 2025Updated 9 months ago
- ☆14Sep 17, 2024Updated last year
- [IEEE VR'22] SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers☆12Jun 21, 2025Updated 7 months ago
- S3PRL for Speech Emotion Recognition (see s3prl > downstream)☆15Feb 5, 2025Updated last year
- FPGA routing delay sensors for effective remote power analysis attacks☆13Aug 13, 2024Updated last year
- A static analysis tool for iOS.☆13Mar 25, 2022Updated 3 years ago
- PyTorch Implementation of paper "Attention-Based Bidirectional Long Short-Term Memory Networks for Relation Classification"☆11Mar 28, 2020Updated 5 years ago
- Entities and dependencies extractor for Python based on Python Language Services of The Standard Library☆16Jul 18, 2023Updated 2 years ago
- 为hbuilderx写的wakatime插件☆12Dec 31, 2021Updated 4 years ago
- [NeurIPS'22] Official Repository for Characterizing Datapoints via Second-Split Forgetting☆16Aug 11, 2023Updated 2 years ago
- ☆15May 10, 2023Updated 2 years ago
- ☆15Jul 30, 2024Updated last year
- ASR for dysarthric speakers with Kaldi☆13Jan 14, 2017Updated 9 years ago
- ☆17Jul 15, 2023Updated 2 years ago
- 😎 A curated list of awesome real-world adversarial examples resources☆62Jul 29, 2020Updated 5 years ago
- This repo augments the scripts in CVTE model (http://kaldi-asr.org/models/m2)☆15May 30, 2019Updated 6 years ago
- 最全中华古诗词数据库, 唐宋两朝近一万四千古诗人, 接近5.5万首唐诗加26万宋诗. 两宋时期1564位词人,21050首词。☆14Feb 9, 2018Updated 8 years ago
- ☆12Apr 14, 2021Updated 4 years ago
- 为wps写的wakatime插件☆15Nov 25, 2020Updated 5 years ago
- ☆15Jan 29, 2021Updated 5 years ago