Datasets of audio adversarial examples for deep speech recognition systems and Python code of a detection system
☆13May 6, 2023Updated 2 years ago
Alternatives and similar repositories for Audio-adversarial-examples
Users that are interested in Audio-adversarial-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- Text to audio with Tik-Tok Voices☆13Apr 6, 2023Updated 2 years ago
- デジモンバイタルブレス/DIGIMON VITAL BRACELET DiM CARD Flash☆10May 12, 2021Updated 4 years ago
- We implement Delegatable Anonymous Credentials using Mercurial Signatures☆21Jun 7, 2022Updated 3 years ago
- ☆10Mar 22, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A notes application with Registration, Authentication, and Realtime Crud☆11Jun 22, 2023Updated 2 years ago
- ☆10Dec 22, 2023Updated 2 years ago
- ☆14Feb 22, 2025Updated last year
- Panopticon is a complete in-DRAM RowHammer mitigation. This code simulates an implementation of Panopticon in DDR5.☆14Jun 2, 2023Updated 2 years ago
- ☆20Oct 24, 2024Updated last year
- Devil-Whisper-Attack☆36Mar 31, 2025Updated 11 months ago
- ☆15Sep 17, 2024Updated last year
- [NeurIPS'22] Official Repository for Characterizing Datapoints via Second-Split Forgetting☆16Aug 11, 2023Updated 2 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆11Sep 28, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- S3PRL for Speech Emotion Recognition (see s3prl > downstream)☆15Feb 28, 2026Updated 3 weeks ago
- RLN on KZG☆21Sep 20, 2023Updated 2 years ago
- Source code of paper "FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge"☆21Jun 12, 2024Updated last year
- (ICLR 2025) Multi-Task Corrupted Prediction for Learning Robust Audio-Visual Speech Representation☆15Apr 29, 2025Updated 10 months ago
- ☆22Apr 3, 2025Updated 11 months ago
- [IEEE VR'22] SPAA: Stealthy Projector-based Adversarial Attacks on Deep Image Classifiers☆12Jun 21, 2025Updated 9 months ago
- NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems [USENIX Security '23]☆20Nov 17, 2022Updated 3 years ago
- FPGA routing delay sensors for effective remote power analysis attacks☆13Aug 13, 2024Updated last year
- ☆15May 10, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ICASSP 2021 accepted paper☆20May 20, 2021Updated 4 years ago
- [NeurIPS'25 Spotlight] MJ-VIDEO: Fine-Grained Benchmarking and Rewarding Video Preferences in Video Generation☆21Feb 23, 2025Updated last year
- PyTorch Implementation of paper "Attention-Based Bidirectional Long Short-Term Memory Networks for Relation Classification"☆11Mar 28, 2020Updated 5 years ago
- Codes and data for KDD 2024 Research Track paper "ProCom: A Few-shot Targeted Community Detection Algorithm"☆11Aug 15, 2024Updated last year
- ☆16Jul 28, 2022Updated 3 years ago
- ☆27Jun 5, 2024Updated last year
- ezDPS: An Efficient and Zero-Knowledge Machine Learning Inference Pipeline☆21Jul 14, 2023Updated 2 years ago
- dlc.wiki - discreete log contracts directory☆25Updated this week
- This repository is for explaining objectives and technical description of how B-Harvest will implement zk-rollup module for Cosmos-SDK☆24Aug 27, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆15Jun 15, 2022Updated 3 years ago
- RLN circuits in Circom☆32Jul 13, 2024Updated last year
- PyTorch implementation of "Watch or Listen: Robust Audio-Visual Speech Recognition with Visual Corruption Modeling and Reliability Scorin…☆21Apr 3, 2024Updated last year
- Unity plugin to protect your privacy in VR.☆18Aug 16, 2022Updated 3 years ago
- Unique identification of 50,000+ virtual reality users from their head and hand motion data☆14May 14, 2023Updated 2 years ago
- LIMA: Language for Integrated Modeling and Analysis☆12Sep 8, 2018Updated 7 years ago
- Unity の実行画面を画像ファイルに連番で書き出し。透過にも対応。☆22Apr 7, 2017Updated 8 years ago