Picture for Hafiz Malik

Hafiz Malik

Augmentation through Laundering Attacks for Audio Spoof Detection

Add code
Oct 01, 2024
Figure 1 for Augmentation through Laundering Attacks for Audio Spoof Detection
Figure 2 for Augmentation through Laundering Attacks for Audio Spoof Detection
Figure 3 for Augmentation through Laundering Attacks for Audio Spoof Detection
Figure 4 for Augmentation through Laundering Attacks for Audio Spoof Detection
Viaarxiv icon

Is Audio Spoof Detection Robust to Laundering Attacks?

Add code
Aug 27, 2024
Figure 1 for Is Audio Spoof Detection Robust to Laundering Attacks?
Figure 2 for Is Audio Spoof Detection Robust to Laundering Attacks?
Figure 3 for Is Audio Spoof Detection Robust to Laundering Attacks?
Figure 4 for Is Audio Spoof Detection Robust to Laundering Attacks?
Viaarxiv icon

Protecting Voice-Controlled Devices against LASER Injection Attacks

Add code
Oct 13, 2023
Viaarxiv icon

Generation of Time-Varying Impedance Attacks Against Haptic Shared Control Steering Systems

Add code
Jul 07, 2023
Viaarxiv icon

Distilling Facial Knowledge With Teacher-Tasks: Semantic-Segmentation-Features For Pose-Invariant Face-Recognition

Add code
Sep 02, 2022
Figure 1 for Distilling Facial Knowledge With Teacher-Tasks: Semantic-Segmentation-Features For Pose-Invariant Face-Recognition
Figure 2 for Distilling Facial Knowledge With Teacher-Tasks: Semantic-Segmentation-Features For Pose-Invariant Face-Recognition
Figure 3 for Distilling Facial Knowledge With Teacher-Tasks: Semantic-Segmentation-Features For Pose-Invariant Face-Recognition
Figure 4 for Distilling Facial Knowledge With Teacher-Tasks: Semantic-Segmentation-Features For Pose-Invariant Face-Recognition
Viaarxiv icon

Location-aware Beamforming for MIMO-enabled UAV Communications: An Unknown Input Observer Approach

Add code
Nov 20, 2021
Figure 1 for Location-aware Beamforming for MIMO-enabled UAV Communications: An Unknown Input Observer Approach
Figure 2 for Location-aware Beamforming for MIMO-enabled UAV Communications: An Unknown Input Observer Approach
Figure 3 for Location-aware Beamforming for MIMO-enabled UAV Communications: An Unknown Input Observer Approach
Figure 4 for Location-aware Beamforming for MIMO-enabled UAV Communications: An Unknown Input Observer Approach
Viaarxiv icon

Graph-Based Intrusion Detection System for Controller Area Networks

Add code
Sep 29, 2020
Figure 1 for Graph-Based Intrusion Detection System for Controller Area Networks
Figure 2 for Graph-Based Intrusion Detection System for Controller Area Networks
Figure 3 for Graph-Based Intrusion Detection System for Controller Area Networks
Figure 4 for Graph-Based Intrusion Detection System for Controller Area Networks
Viaarxiv icon