Author of the publication

Black-Box Audio Adversarial Example Generation Using Variational Autoencoder.

, , and . ICICS (2), volume 12919 of Lecture Notes in Computer Science, page 142-160. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition., , and . ACISP, volume 13083 of Lecture Notes in Computer Science, page 531-549. Springer, (2021)Black-Box Audio Adversarial Example Generation Using Variational Autoencoder., , and . ICICS (2), volume 12919 of Lecture Notes in Computer Science, page 142-160. Springer, (2021)A Markov-Based Update Policy for Constantly Changing Database Systems., , and . IEEE Trans. Engineering Management, 64 (3): 287-300 (2017)A Two-Stage Classifier Approach for Network Intrusion Detection., , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 329-340. Springer, (2018)Dimensionality Reduction and Visualization of Network Intrusion Detection Data., , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 441-455. Springer, (2019)Improving data quality during ERP implementation based on information product map., , and . Enterprise IS, 13 (9): 1275-1291 (2019)A Vehicle Routing Problem with Time Windows for Attended Home Distribution., , and . ICDS, volume 9208 of Lecture Notes in Computer Science, page 127-134. Springer, (2015)TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems., , , , and . SP, page 1667-1683. IEEE, (2023)Adaptive multi-task learning for speech to text translation., , , and . EURASIP J. Audio Speech Music. Process., 2024 (1): 36 (December 2024)Defense Against Multi-target Trojan Attacks., , , , , , and . CoRR, (2022)