Adversarial Attacks on GMM i-vector based Speaker Verification Systems

Add code
Nov 08, 2019
Figure 1 for Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Figure 2 for Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Figure 3 for Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Figure 4 for Adversarial Attacks on GMM i-vector based Speaker Verification Systems

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: