Author of the publication

Black-Box Audio Adversarial Example Generation Using Variational Autoencoder.

, , and . ICICS (2), volume 12919 of Lecture Notes in Computer Science, page 142-160. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

STE3D-CAP: Stereoscopic 3D CAPTCHA., , and . CANS, volume 6467 of Lecture Notes in Computer Science, page 221-240. Springer, (2010)A 3D Approach for the Visualization of Network Intrusion Detection Data., , and . CW, page 308-315. IEEE, (2018)A Visual One-Time Password Authentication Scheme Using Mobile Devices., , , and . ICICS, volume 8958 of Lecture Notes in Computer Science, page 243-257. Springer, (2014)Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games., , and . NSS, volume 7645 of Lecture Notes in Computer Science, page 291-304. Springer, (2012)Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes., , , , , , and . ML4CS, volume 11806 of Lecture Notes in Computer Science, page 320-335. Springer, (2019)Targeted Universal Adversarial Perturbations for Automatic Speech Recognition., , , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 358-373. Springer, (2021)Breaking a 3D-Based CAPTCHA Scheme., , and . ICISC, volume 7259 of Lecture Notes in Computer Science, page 391-405. Springer, (2011)SyLPEnIoT: Symmetric Lightweight Predicate Encryption for Data Privacy Applications in IoT Environments., , , , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 106-126. Springer, (2021)Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns., , , , and . J. Imaging, 8 (12): 324 (December 2022)Privacy-preserving file sharing on cloud storage with certificateless signcryption., , and . Theor. Comput. Sci., (2022)