Get our free extension to see links to code for papers anywhere online!

Chrome logo  Add to Chrome

Firefox logo Add to Firefox

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition



Guangke Chen , Zhe Zhao , Fu Song , Sen Chen , Lingling Fan , Feng Wang , Jiashui Wang


   Access Paper or Ask Questions

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems



Guangke Chen , Zhe Zhao , Fu Song , Sen Chen , Lingling Fan , Yang Liu


   Access Paper or Ask Questions

SEC4SR: A Security Analysis Platform for Speaker Recognition



Guangke Chen , Zhe Zhao , Fu Song , Sen Chen , Lingling Fan , Yang Liu


   Access Paper or Ask Questions

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation



Bozhi Wu , Sen Chen , Cuiyun Gao , Lingling Fan , Yang Liu , Weiping Wen , Michael Lyu


   Access Paper or Ask Questions

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers



Yusi Lei , Sen Chen , Lingling Fan , Fu Song , Yang Liu


   Access Paper or Ask Questions

CORE: Automating Review Recommendation for Code Changes



JingKai Siow , Cuiyun Gao , Lingling Fan , Sen Chen , Yang Liu

* Accepted by 27th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) 

   Access Paper or Ask Questions

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems



Guangke Chen , Sen Chen , Lingling Fan , Xiaoning Du , Zhe Zhao , Fu Song , Yang Liu


   Access Paper or Ask Questions