1 / 3
文档名称:

参考文献.ppt

格式:ppt   大小:531KB   页数:3页
下载后只包含 1 个 PPT 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

参考文献.ppt

上传人:阳仔仔 2022/3/11 文件大小:531 KB

下载得到文件列表

参考文献.ppt

相关文档

文档介绍

文档介绍:参考文献
听不到的语音攻击
[1]G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, and W. Xu, “DolphinAttack: Inaudible Voice Commands,” in iv: [cs], Aug. 2018.
[4]H. Abdullah, W. Garcia, C. Peeters, P. Traynor, K. R. B. Butler, and J. Wilson, “Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems,” in Proceedings 2019 Network and Distributed System Security Symposium, San Diego, CA, 2019.
参考文献
伪装的语音攻击
[1]L. Schönherr, K. Kohls, S. Zeiler, T. Holz, and D. Kolossa, “Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding,” arXiv: [cs, eess], Oct. 2018.
[2]X. Yuan et al., “CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition,” p. 17.
[3]Y. Qin, N. Carlini, I. Goodfellow, G. Cottrell, and C. Raffel, “Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition,” arXiv: [cs, eess, stat], Jun. 2019.
活体检测
[1]H. Feng, K. Fawaz, and K. G. Shin, “Continuous Authentication for Voice Assistants,” in Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking - MobiCom ’17, Snowbird, Utah, USA, 2017, pp. 343–355.
[2]L. Zhang, S. Tan, and J. Yang, “Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications