Picture for Daniel Park

Daniel Park

Large-scale Language Model Rescoring on Long-form Data

Add code
Jun 13, 2023
Viaarxiv icon

Universal Paralinguistic Speech Representations Using Self-Supervised Conformers

Add code
Oct 09, 2021
Figure 1 for Universal Paralinguistic Speech Representations Using Self-Supervised Conformers
Figure 2 for Universal Paralinguistic Speech Representations Using Self-Supervised Conformers
Figure 3 for Universal Paralinguistic Speech Representations Using Self-Supervised Conformers
Figure 4 for Universal Paralinguistic Speech Representations Using Self-Supervised Conformers
Viaarxiv icon

Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models

Add code
Jul 08, 2021
Figure 1 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 2 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 3 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Figure 4 for Output Randomization: A Novel Defense for both White-box and Black-box Adversarial Models
Viaarxiv icon

SpeechStew: Simply Mix All Available Speech Recognition Data to Train One Large Neural Network

Add code
Apr 27, 2021
Figure 1 for SpeechStew: Simply Mix All Available Speech Recognition Data to Train One Large Neural Network
Figure 2 for SpeechStew: Simply Mix All Available Speech Recognition Data to Train One Large Neural Network
Viaarxiv icon

Towards Obfuscated Malware Detection for Low Powered IoT Devices

Add code
Nov 06, 2020
Figure 1 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 2 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 3 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Figure 4 for Towards Obfuscated Malware Detection for Low Powered IoT Devices
Viaarxiv icon

A survey on practical adversarial examples for malware classifiers

Add code
Nov 06, 2020
Figure 1 for A survey on practical adversarial examples for malware classifiers
Figure 2 for A survey on practical adversarial examples for malware classifiers
Figure 3 for A survey on practical adversarial examples for malware classifiers
Viaarxiv icon

Thwarting finite difference adversarial attacks with output randomization

Add code
May 23, 2019
Figure 1 for Thwarting finite difference adversarial attacks with output randomization
Figure 2 for Thwarting finite difference adversarial attacks with output randomization
Figure 3 for Thwarting finite difference adversarial attacks with output randomization
Figure 4 for Thwarting finite difference adversarial attacks with output randomization
Viaarxiv icon

Short Paper: Creating Adversarial Malware Examples using Code Insertion

Add code
Apr 09, 2019
Figure 1 for Short Paper: Creating Adversarial Malware Examples using Code Insertion
Figure 2 for Short Paper: Creating Adversarial Malware Examples using Code Insertion
Figure 3 for Short Paper: Creating Adversarial Malware Examples using Code Insertion
Figure 4 for Short Paper: Creating Adversarial Malware Examples using Code Insertion
Viaarxiv icon