Picture for Patrick Traynor

Patrick Traynor

Analyzing the AI Nudification Application Ecosystem

Add code
Nov 14, 2024
Viaarxiv icon

Every Breath You Don't Take: Deepfake Speech Detection Using Breath

Add code
Apr 26, 2024
Viaarxiv icon

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

Add code
Mar 10, 2022
Figure 1 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 2 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 3 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 4 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Viaarxiv icon

Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs

Add code
Oct 25, 2021
Figure 1 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 2 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 3 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 4 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Viaarxiv icon

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

Add code
Jul 21, 2020
Figure 1 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 2 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 3 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 4 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Viaarxiv icon

Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Add code
Oct 11, 2019
Figure 1 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 2 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 3 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 4 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Viaarxiv icon

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Add code
Mar 18, 2019
Figure 1 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 2 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 3 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 4 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Viaarxiv icon