Picture for Mingyu Dong

Mingyu Dong

Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations

Add code
Jun 30, 2022
Figure 1 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 2 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 3 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Figure 4 for Detecting and Recovering Adversarial Examples from Extracting Non-robust and Highly Predictive Adversarial Perturbations
Viaarxiv icon

Adversarial Privacy Protection on Speech Enhancement

Add code
Jun 16, 2022
Figure 1 for Adversarial Privacy Protection on Speech Enhancement
Figure 2 for Adversarial Privacy Protection on Speech Enhancement
Figure 3 for Adversarial Privacy Protection on Speech Enhancement
Figure 4 for Adversarial Privacy Protection on Speech Enhancement
Viaarxiv icon

Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise

Add code
Sep 09, 2021
Figure 1 for Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Figure 2 for Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Figure 3 for Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Figure 4 for Adversarial Example Devastation and Detection on Speech Recognition System by Adding Random Noise
Viaarxiv icon