Alert button
Picture for Guangke Chen

Guangke Chen

Alert button

A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion

Add code
Bookmark button
Alert button
Jan 30, 2024
Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du, Yang Liu

Viaarxiv icon

SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems

Add code
Bookmark button
Alert button
Sep 14, 2023
Guangke Chen, Yedi Zhang, Fu Song

Figure 1 for SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
Figure 2 for SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
Figure 3 for SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
Figure 4 for SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
Viaarxiv icon

QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems

Add code
Bookmark button
Alert button
May 23, 2023
Guangke Chen, Yedi Zhang, Zhe Zhao, Fu Song

Figure 1 for QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Figure 2 for QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Figure 3 for QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Figure 4 for QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
Viaarxiv icon

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition

Add code
Bookmark button
Alert button
Jun 07, 2022
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang

Figure 1 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 2 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 3 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 4 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Viaarxiv icon

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems

Add code
Bookmark button
Alert button
Jun 07, 2022
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Figure 1 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 2 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 3 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 4 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Viaarxiv icon

SEC4SR: A Security Analysis Platform for Speaker Recognition

Add code
Bookmark button
Alert button
Sep 04, 2021
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Figure 1 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 2 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 3 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 4 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Viaarxiv icon

Attack as Defense: Characterizing Adversarial Examples using Robustness

Add code
Bookmark button
Alert button
Mar 13, 2021
Zhe Zhao, Guangke Chen, Jingyi Wang, Yiwei Yang, Fu Song, Jun Sun

Figure 1 for Attack as Defense: Characterizing Adversarial Examples using Robustness
Figure 2 for Attack as Defense: Characterizing Adversarial Examples using Robustness
Figure 3 for Attack as Defense: Characterizing Adversarial Examples using Robustness
Figure 4 for Attack as Defense: Characterizing Adversarial Examples using Robustness
Viaarxiv icon

BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks

Add code
Bookmark button
Alert button
Mar 12, 2021
Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Taolue Chen

Figure 1 for BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks
Figure 2 for BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks
Figure 3 for BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks
Figure 4 for BDD4BNN: A BDD-based Quantitative Analysis Framework for Binarized Neural Networks
Viaarxiv icon

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

Add code
Bookmark button
Alert button
Nov 03, 2019
Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu

Figure 1 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 2 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 3 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 4 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Viaarxiv icon