Fooling End-to-end Speaker Verification by Adversarial Examples

Add code
Feb 16, 2018
Figure 1 for Fooling End-to-end Speaker Verification by Adversarial Examples
Figure 2 for Fooling End-to-end Speaker Verification by Adversarial Examples
Figure 3 for Fooling End-to-end Speaker Verification by Adversarial Examples

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: