Login / Signup
A defense scheme of voice control system against DolphinAttack.
Dongqiu Huang
Zhihong Tian
Shen Su
Yu Jiang
Published in:
CIAT (2020)
Keyphrases
</>
control system
control strategy
recognition scheme
network security
detection scheme
fuzzy logic
intrusion detection
closed loop
control method
advanced research projects agency
data sets
controller design
control scheme
control algorithm
wireless sensor networks
multiscale
neural network