Login / Signup
Audio Adversarial Examples: Attacks Using Vocal Masks.
Kai Yuan Tay
Lynnette Hui Xian Ng
Wei Han Chua
Lucerne Loke
Danqi Ye
Melissa Wan Jun Chua
Published in:
CoRR (2021)
Keyphrases
</>
multimedia
emotion recognition
signal processing
visual information
countermeasures
bounding box
speech signal
security threats
audio signals