Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

automatic speaker verification systems

biblio

Visible to the public Fooling End-To-End Speaker Verification With Adversarial Examples

Submitted by aekwall on Wed, 01/16/2019 - 2:10pm
  • adversarial examples
  • White Box Security
  • YOHO
  • original speaker examples
  • NTIMIT
  • MFCC
  • Mel frequency cepstral coefficient
  • fooling end-to-end speaker verification
  • end-to-end deep neural models
  • deep end-to-end network
  • black-box attacks
  • automatic speaker verification systems
  • Automatic speaker verification
  • security of data
  • Perturbation methods
  • Neural networks
  • neural nets
  • Task Analysis
  • Training
  • speaker recognition
  • composability
  • Metrics
  • pubcrawl
  • resilience
  • standards

Terms of Use  |  ©2023. CPS-VO