Sign in
Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification.
Songxiang Liu
Haibin Wu
Hung-yi Lee
Helen Meng
Published in:
CoRR (2019)
Keyphrases
</>
countermeasures
speaker verification
information security
noisy environments
power analysis
cyber attacks
audio visual
security measures
java card
multilayer perceptron
emotion recognition
neural network
principal component analysis
security issues
differential power analysis