Login / Signup
Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks: Invited Paper.
Morriel Kasher
Michael Zhao
Aryeh Greenberg
Devin Gulati
Silvija Kokalj-Filipovic
Predrag Spasojevic
Published in:
WiseML@WiSec (2021)
Keyphrases
</>
invited paper
multimedia
digital image watermarking
mobile devices
digital images
watermarking scheme
image watermarking
signal processing
visual information
countermeasures
emotion recognition
watermarking technique
text to speech