Picture for Sonal Joshi

Sonal Joshi

Clean Label Attacks against SLU Systems

Add code
Sep 13, 2024
Figure 1 for Clean Label Attacks against SLU Systems
Figure 2 for Clean Label Attacks against SLU Systems
Figure 3 for Clean Label Attacks against SLU Systems
Figure 4 for Clean Label Attacks against SLU Systems
Viaarxiv icon

Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification

Add code
Feb 29, 2024
Figure 1 for Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification
Figure 2 for Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification
Figure 3 for Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification
Figure 4 for Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification
Viaarxiv icon

Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser

Add code
Apr 08, 2022
Figure 1 for Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Figure 2 for Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Figure 3 for Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Figure 4 for Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Viaarxiv icon

AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification

Add code
Apr 08, 2022
Figure 1 for AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Figure 2 for AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Figure 3 for AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Figure 4 for AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Viaarxiv icon

Representation Learning to Classify and Detect Adversarial Attacks against Speaker and Speech Recognition Systems

Add code
Jul 09, 2021
Figure 1 for Representation Learning to Classify and Detect Adversarial Attacks against Speaker and Speech Recognition Systems
Figure 2 for Representation Learning to Classify and Detect Adversarial Attacks against Speaker and Speech Recognition Systems
Figure 3 for Representation Learning to Classify and Detect Adversarial Attacks against Speaker and Speech Recognition Systems
Figure 4 for Representation Learning to Classify and Detect Adversarial Attacks against Speaker and Speech Recognition Systems
Viaarxiv icon

Adversarial Attacks and Defenses for Speech Recognition Systems

Add code
Mar 31, 2021
Figure 1 for Adversarial Attacks and Defenses for Speech Recognition Systems
Viaarxiv icon

Adversarial Attacks and Defenses for Speaker Identification Systems

Add code
Jan 22, 2021
Figure 1 for Adversarial Attacks and Defenses for Speaker Identification Systems
Figure 2 for Adversarial Attacks and Defenses for Speaker Identification Systems
Figure 3 for Adversarial Attacks and Defenses for Speaker Identification Systems
Figure 4 for Adversarial Attacks and Defenses for Speaker Identification Systems
Viaarxiv icon