Picture for Kevin R. B. Butler

Kevin R. B. Butler

Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples

Add code
Mar 04, 2021
Figure 1 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 2 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 3 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 4 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Viaarxiv icon

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Add code
Mar 18, 2019
Figure 1 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 2 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 3 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 4 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Viaarxiv icon

Explainable Black-Box Attacks Against Model-based Authentication

Add code
Sep 28, 2018
Figure 1 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 2 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 3 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 4 for Explainable Black-Box Attacks Against Model-based Authentication
Viaarxiv icon