Cited By
View all- Yao WYang JHe YLiu JWen W(2025)Imperceptible rhythm backdoor attacks: Exploring rhythm transformation for embedding undetectable vulnerabilities on speech recognitionNeurocomputing10.1016/j.neucom.2024.128779614(128779)Online publication date: Jan-2025
- Xu WXu YZhang S(2025)Sample-independent federated learning backdoor attack in speaker recognitionCluster Computing10.1007/s10586-024-04837-128:3Online publication date: 21-Jan-2025
- Yan BLan JYan Z(2024)Backdoor Attacks against Voice Recognition Systems: A SurveyACM Computing Surveys10.1145/370198557:3(1-35)Online publication date: 22-Nov-2024
- Show More Cited By