Login / Signup

Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks: Invited Paper.

Morriel KasherMichael ZhaoAryeh GreenbergDevin GulatiSilvija Kokalj-FilipovicPredrag Spasojevic
Published in: WiseML@WiSec (2021)
Keyphrases