Picture for Washington Garcia

Washington Garcia

Stacked Universal Successor Feature Approximators for Safety in Reinforcement Learning

Add code
Sep 06, 2024
Viaarxiv icon

Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs

Add code
Oct 25, 2021
Figure 1 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 2 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 3 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 4 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Viaarxiv icon

Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples

Add code
Mar 04, 2021
Figure 1 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 2 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 3 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 4 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Viaarxiv icon

Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Add code
Oct 11, 2019
Figure 1 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 2 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 3 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Figure 4 for Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems
Viaarxiv icon

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Add code
Mar 18, 2019
Figure 1 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 2 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 3 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 4 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Viaarxiv icon

Explainable Black-Box Attacks Against Model-based Authentication

Add code
Sep 28, 2018
Figure 1 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 2 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 3 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 4 for Explainable Black-Box Attacks Against Model-based Authentication
Viaarxiv icon

MTLE: A Multitask Learning Encoder of Visual Feature Representations for Video and Movie Description

Add code
Sep 19, 2018
Figure 1 for MTLE: A Multitask Learning Encoder of Visual Feature Representations for Video and Movie Description
Figure 2 for MTLE: A Multitask Learning Encoder of Visual Feature Representations for Video and Movie Description
Figure 3 for MTLE: A Multitask Learning Encoder of Visual Feature Representations for Video and Movie Description
Figure 4 for MTLE: A Multitask Learning Encoder of Visual Feature Representations for Video and Movie Description
Viaarxiv icon