Alert button
Picture for Kevin R. B. Butler

Kevin R. B. Butler

Alert button

Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples

Add code
Bookmark button
Alert button
Mar 04, 2021
Washington Garcia, Pin-Yu Chen, Somesh Jha, Scott Clouse, Kevin R. B. Butler

Figure 1 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 2 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 3 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Figure 4 for Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples
Viaarxiv icon

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Add code
Bookmark button
Alert button
Mar 18, 2019
Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson

Figure 1 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 2 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 3 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Figure 4 for Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Viaarxiv icon

Explainable Black-Box Attacks Against Model-based Authentication

Add code
Bookmark button
Alert button
Sep 28, 2018
Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler

Figure 1 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 2 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 3 for Explainable Black-Box Attacks Against Model-based Authentication
Figure 4 for Explainable Black-Box Attacks Against Model-based Authentication
Viaarxiv icon