Author of the publication

SlothSpeech: Denial-of-service Attack Against Speech Recognition Models.

, , , , , and . INTERSPEECH, page 1274-1278. ISCA, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal Chroma Subsampling Strategy for Compressing Mosaic Video Sequences With Arbitrary RGB Color Filter Arrays in H.264/AVC., , , and . IEEE Trans. Circuits Syst. Video Techn., 23 (4): 591-606 (2013)Linear-time prediction mode reduction method for intracoding in H.264/AVC., , , , and . Signal Image Video Process., 11 (3): 447-454 (2017)Intelligent Judgment Method of Superimposed Label Recognition Technology Based on a Deep Learning Target Detection Algorithm for Detecting Wiring Errors in Current Transformer Tests., , , , , , and . CECNet, volume 363 of Frontiers in Artificial Intelligence and Applications, page 417-423. IOS Press, (2022)A Real Time Wireless Interactive Multimedia System., , , , and . APWeb (1), volume 9931 of Lecture Notes in Computer Science, page 53-65. Springer, (2016)Design of an anthropomorphic lower extremity exoskeleton with compatible joints., , and . ROBIO, page 1374-1379. IEEE, (2014)DCNet: Dense Correspondence Neural Network for 6DoF Object Pose Estimation in Occluded Scenes., , , , and . ACM Multimedia, page 3929-3937. ACM, (2020)Quantum Oblivious Transfer Using Tripartite Entangled States., , , and . FGCN (1), page 464-468. IEEE Computer Society, (2007)Feedback halves the dispersion for some two-user broadcast channels with common message., , , and . ISIT, page 196-200. IEEE, (2017)Success Factors in Micro-Celebrity Endorsement: The Role of Informational and Narrative Content in Product Recommendation., and . HCI (24), volume 12204 of Lecture Notes in Computer Science, page 562-575. Springer, (2020)A Large-Scale Empirical Study on Android Runtime-Permission Rationale Messages., , , , , and . VL/HCC, page 137-146. IEEE Computer Society, (2018)