MP3 Compression To Diminish Adversarial Noise in End-to-End Speech Recognition
暂无分享,去创建一个
Bernhard U. Seeber | Gerhard Rigoll | Ludwig Kurzinger | Iustina Andronic | Edgar Ricardo Chavez Rosas | B. Seeber | G. Rigoll | Ludwig Kurzinger | I. Andronic
[1] Li Chen,et al. ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio , 2018, ECML/PKDD.
[2] Jun Zhu,et al. Boosting Adversarial Attacks with Momentum , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[3] J. Kalita,et al. Speech Coding and Audio Preprocessing for Mitigating and Detecting Audio Adversarial Examples on Automatic Speech Recognition , 2018 .
[4] Quoc V. Le,et al. Listen, attend and spell: A neural network for large vocabulary conversational speech recognition , 2015, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[5] Dan Iter,et al. Generating Adversarial Examples for Speech Recognition , 2017 .
[6] Mei-Yuh Hwang,et al. Adversarial Regularization for Attention Based End-to-End Robust Speech Recognition , 2019, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[7] Iustina Andronic. MP3 Compression as a Means to Improve Robustness against Adversarial Noise Targeting Attention-based End-to-End Speech Recognition , 2020 .
[8] Erich Elsen,et al. Deep Speech: Scaling up end-to-end speech recognition , 2014, ArXiv.
[9] Jugal K. Kalita,et al. Noise Flooding for Detecting Audio Adversarial Examples Against Automatic Speech Recognition , 2018, 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).
[10] Lujun Li,et al. Exploring Hybrid CTC/Attention End-to-End Speech Recognition with Gaussian Processes , 2019, SPECOM.
[11] Qian Wang,et al. Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures , 2019, IEEE Communications Magazine.
[12] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[13] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[14] Bo Li,et al. Towards Mitigating Audio Adversarial Perturbations , 2018 .
[15] Shinji Watanabe,et al. ESPnet: End-to-End Speech Processing Toolkit , 2018, INTERSPEECH.
[16] Jugal K. Kalita,et al. Isolated and Ensemble Audio Preprocessing Methods for Detecting Adversarial Examples against Automatic Speech Recognition , 2018, ROCLING.
[17] Mani B. Srivastava,et al. Did you hear that? Adversarial Examples Against Automatic Speech Recognition , 2018, ArXiv.
[18] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[19] Steffen Zeiler,et al. Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems , 2019, ACSAC.
[20] Vance W. Berger,et al. Kolmogorov–Smirnov Test: Overview , 2014 .
[21] John R. Hershey,et al. Hybrid CTC/Attention Architecture for End-to-End Speech Recognition , 2017, IEEE Journal of Selected Topics in Signal Processing.
[22] Karlheinz Brandenburg,et al. MP3 and AAC Explained , 1999 .
[23] Samy Bengio,et al. Adversarial Machine Learning at Scale , 2016, ICLR.
[24] Dorothea Kolossa,et al. Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding , 2018, NDSS.
[25] Jürgen Schmidhuber,et al. Connectionist temporal classification: labelling unsegmented sequence data with recurrent neural networks , 2006, ICML.
[26] Colin Raffel,et al. librosa: Audio and Music Signal Analysis in Python , 2015, SciPy.
[27] Micah Sherr,et al. Hidden Voice Commands , 2016, USENIX Security Symposium.