Login / Signup
Hidden Voice Commands.
Nicholas Carlini
Pratyush Mishra
Tavish Vaidya
Yuankai Zhang
Micah Sherr
Clay Shields
David A. Wagner
Wenchao Zhou
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
data sets
high level
real time
machine learning
artificial intelligence
database systems
multiscale
digital libraries
relational databases
voice activity detection