Picture for Lingling Fan

Lingling Fan

An Empirical Study of Bugs in Open-Source Federated Learning Framework

Add code
Aug 09, 2023
Viaarxiv icon

Experimental Realization of Convolution Processing in Photonic Synthetic Frequency Dimensions

Add code
May 05, 2023
Viaarxiv icon

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition

Add code
Jun 07, 2022
Figure 1 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 2 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 3 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 4 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Viaarxiv icon

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems

Add code
Jun 07, 2022
Figure 1 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 2 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 3 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 4 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Viaarxiv icon

SEC4SR: A Security Analysis Platform for Speaker Recognition

Add code
Sep 04, 2021
Figure 1 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 2 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 3 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 4 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Viaarxiv icon

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation

Add code
Apr 24, 2020
Figure 1 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 2 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 3 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 4 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Viaarxiv icon

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Add code
Apr 15, 2020
Figure 1 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 2 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 3 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 4 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Viaarxiv icon

CORE: Automating Review Recommendation for Code Changes

Add code
Dec 20, 2019
Figure 1 for CORE: Automating Review Recommendation for Code Changes
Figure 2 for CORE: Automating Review Recommendation for Code Changes
Figure 3 for CORE: Automating Review Recommendation for Code Changes
Figure 4 for CORE: Automating Review Recommendation for Code Changes
Viaarxiv icon

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

Add code
Nov 03, 2019
Figure 1 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 2 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 3 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 4 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Viaarxiv icon