Cited By
View all- Yuan XZhang JChen KWei CLi RMa ZLing X(2024)Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition SystemsACM Transactions on Privacy and Security10.1145/370172528:1(1-27)Online publication date: 7-Nov-2024
- Li GZeng HGuo HRen YDixon ACao ZLi TShu YLiu JTan RHe YChen J(2024)PiezoBud: A Piezo-Aided Secure Earbud with Practical Speaker AuthenticationProceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems10.1145/3666025.3699358(564-577)Online publication date: 4-Nov-2024
- Guo HWang GChen BWang YZhang XChen XYan QXiao LGanesan DLane NShi W(2024)WavePurifier: Purifying Audio Adversarial Examples via Hierarchical Diffusion ModelsProceedings of the 30th Annual International Conference on Mobile Computing and Networking10.1145/3636534.3690692(1268-1282)Online publication date: 4-Dec-2024
- Show More Cited By