Defending against Adversarial Audio via Diffusion Model
暂无分享,去创建一个
[1] D. Song,et al. DensePure: Understanding Diffusion Models towards Adversarial Robustness , 2022, ArXiv.
[2] Anima Anandkumar,et al. AdvDO: Realistic Adversarial Attacks for Trajectory Prediction , 2022, ECCV.
[3] Anima Anandkumar,et al. Robust Trajectory Prediction against Adversarial Attacks , 2022, CoRL.
[4] J. Z. Kolter,et al. (Certified!!) Adversarial Robustness for Free! , 2022, ICLR.
[5] Sen Chen,et al. Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition , 2022, IEEE Transactions on Dependable and Secure Computing.
[6] Anima Anandkumar,et al. Diffusion Models for Adversarial Purification , 2022, ICML.
[7] S. Khudanpur,et al. Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser , 2022, ArXiv.
[8] Tim Salimans,et al. Progressive Distillation for Fast Sampling of Diffusion Models , 2022, ICLR.
[9] Mingjie Sun,et al. Characterizing Attacks on Deep Reinforcement Learning , 2019, AAMAS.
[10] Juho Lee,et al. Adversarial purification with Score-based generative models , 2021, ICML.
[11] Zhifeng Kong,et al. On Fast Sampling of Diffusion Probabilistic Models , 2021, ArXiv.
[12] Prafulla Dhariwal,et al. Diffusion Models Beat GANs on Image Synthesis , 2021, NeurIPS.
[13] Prafulla Dhariwal,et al. Improved Denoising Diffusion Probabilistic Models , 2021, ICML.
[14] Iain Murray,et al. Maximum Likelihood Training of Score-Based Diffusion Models , 2021, NeurIPS.
[15] Abhishek Kumar,et al. Score-Based Generative Modeling through Stochastic Differential Equations , 2020, ICLR.
[16] Jiaming Song,et al. Denoising Diffusion Implicit Models , 2020, ICLR.
[17] Bryan Catanzaro,et al. DiffWave: A Versatile Diffusion Model for Audio Synthesis , 2020, ICLR.
[18] Heiga Zen,et al. WaveGrad: Estimating Gradients for Waveform Generation , 2020, ICLR.
[19] Yang Liu,et al. Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems , 2019, 2021 IEEE Symposium on Security and Privacy (SP).
[20] Patrick Traynor,et al. Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems , 2019, ArXiv.
[21] Anima Anandkumar,et al. Adversarially Robust 3D Point Cloud Recognition Using Self-Supervisions , 2021, NeurIPS.
[22] Gal Mishne,et al. Online Adversarial Purification based on Self-supervised Learning , 2021, ICLR.
[23] Pieter Abbeel,et al. Denoising Diffusion Probabilistic Models , 2020, NeurIPS.
[24] Fahad Shahbaz Khan,et al. A Self-supervised Approach for Adversarial Robustness , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[25] Mingjie Sun,et al. Denoised Smoothing: A Provable Defense for Pretrained Classifiers , 2020, NeurIPS.
[26] Matthias Hein,et al. Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks , 2020, ICML.
[27] Florian Tramèr,et al. On Adaptive Attacks to Adversarial Example Defenses , 2020, NeurIPS.
[28] J. Zico Kolter,et al. Fast is better than free: Revisiting adversarial training , 2020, ICLR.
[29] David Duvenaud,et al. Scalable Gradients for Stochastic Differential Equations , 2020, AISTATS.
[30] Nicolas Flammarion,et al. Square Attack: a query-efficient black-box adversarial attack via random search , 2019, ECCV.
[31] Cho-Jui Hsieh,et al. Towards Stable and Efficient Training of Verifiably Robust Neural Networks , 2019, ICLR.
[32] Ting Wang,et al. SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems , 2019, AsiaCCS.
[33] J. Zico Kolter,et al. Adversarial Music: Real World Audio Adversary Against Wake-word Detection System , 2019, NeurIPS.
[34] Byeonggeun Kim,et al. Query-by-Example On-Device Keyword Spotting , 2019, 2019 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU).
[35] Judy Hoffman,et al. Robust Learning with Jacobian Regularization , 2019, ArXiv.
[36] Kevin Fu,et al. Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.
[37] Yang Song,et al. Generative Modeling by Estimating Gradients of the Data Distribution , 2019, NeurIPS.
[38] Ruigang Yang,et al. Adversarial Objects Against LiDAR-Based Autonomous Driving Systems , 2019, ArXiv.
[39] Arno Solin,et al. Applied Stochastic Differential Equations , 2019 .
[40] Bin Dong,et al. You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle , 2019, NeurIPS.
[41] Dan Boneh,et al. Adversarial Training and Robustness for Multiple Perturbations , 2019, NeurIPS.
[42] Larry S. Davis,et al. Adversarial Training for Free! , 2019, NeurIPS.
[43] Colin Raffel,et al. Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition , 2019, ICML.
[44] Tara N. Sainath,et al. Lingvo: a Modular and Scalable Framework for Sequence-to-Sequence Modeling , 2019, ArXiv.
[45] J. Zico Kolter,et al. Certified Adversarial Robustness via Randomized Smoothing , 2019, ICML.
[46] Michael I. Jordan,et al. Theoretically Principled Trade-off between Robustness and Accuracy , 2019, ICML.
[47] Titouan Parcollet,et al. The Pytorch-kaldi Speech Recognition Toolkit , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[48] Bo Li,et al. MeshAdv: Adversarial Meshes for Visual Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[49] Zhuolin Yang,et al. Characterizing Audio Adversarial Examples Using Temporal Dependency , 2018, ICLR.
[50] Nima Mesgarani,et al. Conv-TasNet: Surpassing Ideal Time–Frequency Magnitude Masking for Speech Separation , 2018, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[51] Chris Donahue,et al. Adversarial Audio Synthesis , 2018, ICLR.
[52] Yoshua Bengio,et al. Speaker Recognition from Raw Waveform with SincNet , 2018, 2018 IEEE Spoken Language Technology Workshop (SLT).
[53] Sanjeev Khudanpur,et al. X-Vectors: Robust DNN Embeddings for Speaker Recognition , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[54] Pete Warden,et al. Speech Commands: A Dataset for Limited-Vocabulary Speech Recognition , 2018, ArXiv.
[55] Lei Xie,et al. Attention-based End-to-End Models for Small-Footprint Keyword Spotting , 2018, INTERSPEECH.
[56] Rama Chellappa,et al. Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.
[57] Mingyan Liu,et al. Generating Adversarial Examples with Adversarial Networks , 2018, IJCAI.
[58] Mingyan Liu,et al. Spatially Transformed Adversarial Examples , 2018, ICLR.
[59] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[60] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[61] J. Kalita,et al. Speech Coding and Audio Preprocessing for Mitigating and Detecting Audio Adversarial Examples on Automatic Speech Recognition , 2018 .
[62] Zhuowen Tu,et al. Aggregated Residual Transformations for Deep Neural Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[63] Wei Dai,et al. Very deep convolutional neural networks for raw waveforms , 2016, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[64] Kilian Q. Weinberger,et al. Densely Connected Convolutional Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[65] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[66] Nikos Komodakis,et al. Wide Residual Networks , 2016, BMVC.
[67] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[68] Chong Wang,et al. Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin , 2015, ICML.
[69] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[70] Luca Rigazio,et al. Towards Deep Neural Network Architectures Robust to Adversarial Examples , 2014, ICLR.
[71] Andrew Zisserman,et al. Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.
[72] Georg Heigold,et al. Small-footprint keyword spotting using deep neural networks , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[73] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[74] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..