Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diagonal Recurrent Neural Network-Based Hysteresis Modeling., , and . IEEE Trans. Neural Networks Learn. Syst., 33 (12): 7502-7512 (2022)Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples., , , , , , and . ACM Trans. Softw. Eng. Methodol., 33 (3): 68:1-68:45 (March 2024)SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems., , and . CoRR, (2023)Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (5): 3970-3987 (September 2023)Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition., , , , , , and . CoRR, (2022)Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems., , , , , , and . CoRR, (2019)SEC4SR: A Security Analysis Platform for Speaker Recognition., , , , , and . CoRR, (2021)QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems., , , and . USENIX Security Symposium, page 2437-2454. USENIX Association, (2023)Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems., , , , , , and . SP, page 694-711. IEEE, (2021)Attack as defense: characterizing adversarial examples using robustness., , , , , and . ISSTA, page 42-55. ACM, (2021)