Login / Signup
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Xinfeng Li
Xiaoyu Ji
Chen Yan
Chaohao Li
Yichen Li
Zhenning Zhang
Wenyuan Xu
Published in:
USENIX Security Symposium (2023)
Keyphrases
</>
learning process
learning algorithm
reinforcement learning
online learning
knowledge acquisition
user interface
active learning
learning systems
background knowledge
data sets
prior knowledge
unsupervised learning
learning tasks
software design