Cited By
View all- Yao WYang JHe YLiu JWen W(2025)Imperceptible rhythm backdoor attacks: Exploring rhythm transformation for embedding undetectable vulnerabilities on speech recognitionNeurocomputing10.1016/j.neucom.2024.128779614(128779)Online publication date: Jan-2025
- Yan BLan JYan Z(2024)Backdoor Attacks against Voice Recognition Systems: A SurveyACM Computing Surveys10.1145/370198557:3(1-35)Online publication date: 22-Nov-2024
- Schoof CKoffas SConti MPicek SPintor MChen XJagielski M(2024)EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional ProsodyProceedings of the 2024 Workshop on Artificial Intelligence and Security10.1145/3689932.3694773(137-148)Online publication date: 6-Nov-2024
- Show More Cited By