Alert button

Adversarial Attacks on GMM i-vector based Speaker Verification Systems

Add code
Bookmark button
Alert button
Nov 08, 2019
Xu Li, Jinghua Zhong, Xixin Wu, Jianwei Yu, Xunying Liu, Helen Meng

Figure 1 for Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Figure 2 for Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Figure 3 for Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Figure 4 for Adversarial Attacks on GMM i-vector based Speaker Verification Systems

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: