Alert button

On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples

Add code
Bookmark button
Alert button
Aug 03, 2021
Adelin Travers, Lorna Licollari, Guanghan Wang, Varun Chandrasekaran, Adam Dziedzic, David Lie, Nicolas Papernot

Figure 1 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 2 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 3 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Figure 4 for On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: