Securing Voice Authentication Applications Against Targeted Data Poisoning.
Alireza MohammadiKeshav SoodDhananjay R. ThiruvadyAsef NazariPublished in: CoRR (2024)
Keyphrases
- data sets
- data structure
- data collection
- database
- synthetic data
- data points
- data processing
- original data
- training data
- data analysis
- image data
- historical data
- high dimensional data
- knowledge discovery
- high quality
- dimensionality reduction
- semi supervised
- data sources
- missing data
- spatial data
- experimental data
- data distribution
- data acquisition
- feature selection
- data objects
- data mining