Login / Signup

Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks.

Junqi WuBolin ChenWeiqi LuoYanmei Fang
Published in: IEEE Trans. Inf. Forensics Secur. (2020)
Keyphrases