Login / Signup

Adversarial Attacks on Voice Recognition Based on Hyper Dimensional Computing.

Wencheng ChenHongyu Li
Published in: J. Signal Process. Syst. (2021)
Keyphrases
  • voice recognition
  • dangerous situations
  • real time
  • cellular phone
  • image sequences
  • user interface