Login / Signup

Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition.

Wenhan YaoJiangkun YangYongqiang HeJia LiuWeiping Wen
Published in: CoRR (2024)
Keyphrases