Code of paper "AdvReverb: AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception"
☆19Nov 26, 2023Updated 2 years ago
Alternatives and similar repositories for AdvReverb
Users that are interested in AdvReverb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Apr 6, 2025Updated 11 months ago
- ☆16Oct 18, 2023Updated 2 years ago
- ☆21Sep 17, 2024Updated last year
- Robust Audio Adversarial Example for a Physical Attack☆62Nov 13, 2019Updated 6 years ago
- [InterSpeech'2023] "Betray Oneself: A Novel Audio DeepFake Detection Model via Mono-to-Stereo Conversion"☆13Mar 14, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Region-Based Optimization in Continual Learning for Audio Deepfake Detection☆12Dec 17, 2024Updated last year
- ☆12Nov 30, 2021Updated 4 years ago
- [CCS-LAMPS 2024] Mitigating Unauthorized Speech Synthesis for Voice Protection☆19Nov 1, 2024Updated last year
- KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems☆19Oct 3, 2023Updated 2 years ago
- Defending against Adversarial Audio via Diffusion Model (ICLR 2023)☆35Mar 2, 2023Updated 3 years ago
- This repository presents FSD dataset for song deepfake detection.☆25Aug 18, 2025Updated 7 months ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- [ICLR 2025] SONICS: Synthetic Or Not - Identifying Counterfeit Songs☆45May 23, 2025Updated 10 months ago
- Code for our ICLR 2023 paper Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples.☆18May 31, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for the paper Real-Time Neural Voice Camouflage☆28Apr 13, 2022Updated 3 years ago
- ☆24Dec 20, 2022Updated 3 years ago
- ☆27Jan 17, 2024Updated 2 years ago
- ☆12Nov 12, 2024Updated last year
- Implementation of "Defense against Adversarial Attacks on Audio DeepFake Detection"☆60Oct 20, 2023Updated 2 years ago
- Baselines for IS25 Source Tracing Special Session☆33Jan 3, 2025Updated last year
- Audio Jailbreak: An Open Comprehensive Benchmark for Jailbreaking Large Audio-Language Models☆32Oct 6, 2025Updated 5 months ago
- Chinese-native image generation while compatible with SD eco-system, 1st-gen, AAAI2025☆13Jun 25, 2024Updated last year
- Continual Learning Method RAWM for ICML 2023☆23Sep 26, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Source code of paper "FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge"☆21Jun 12, 2024Updated last year
- This is the implementation of the paper "Physiological-Physical Feature Fusion for Automatic Voice Spoofing Detection"☆13Jun 5, 2023Updated 2 years ago
- Official Implementation for "Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models" (IE…☆28Mar 24, 2025Updated last year
- Pytorch implementation of "LEVERAGING POSITIONAL-RELATED LOCAL-GLOBAL DEPENDENCY FOR SYNTHETIC SPEECH DETECTION"☆37Jul 24, 2023Updated 2 years ago
- Deepfake cross-lingual evaluation dataset (DECRO) is constructed to evaluate the influence of language differences on deepfake detection.…☆16Sep 14, 2023Updated 2 years ago
- A fully and partially fake speech dataset for evaluation☆14Nov 11, 2025Updated 4 months ago
- SkillOrchestra: Learning to Route Agents via Skill Transfer☆48Updated this week
- [ACM CCS'24] SafeEar: Content Privacy-Preserving Audio Deepfake Detection☆182Mar 24, 2025Updated last year
- ☆11Apr 12, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Linux进程间通信(消息队列/信号量+共享内存)☆19Jun 8, 2018Updated 7 years ago
- ☆14Apr 11, 2024Updated last year
- Implementation of a differentially private generative adversarial network.☆11Nov 20, 2018Updated 7 years ago
- This repository contains the PyTorch implementation of Zeroth Order Optimization Based Adversarial Black Box Attack (https://arxiv.org/ab…☆44Feb 25, 2023Updated 3 years ago
- Implementation of the paper "Improved DeepFake Detection Using Whisper Features"☆112Apr 9, 2025Updated 11 months ago
- ☆18Jan 10, 2024Updated 2 years ago
- Official implementation of the Odyssey paper "A Probabilistic Fusion Framework for Spoofing Aware Speaker Verification"☆18Jun 24, 2022Updated 3 years ago