UM

Browse/Search Results:  1-1 of 1 Help

Selected(0)Clear Items/Page:    Sort:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems Journal article
Wang, Shen, Zhang, Zhaoyang, Zhu, Guopu, Zhang, Xinpeng, Zhou, Yicong, Huang, Jiwu. Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems[J]. IEEE Transactions on Information Forensics and Security, 2023, 18, 351 - 364.
Authors:  Wang, Shen;  Zhang, Zhaoyang;  Zhu, Guopu;  Zhang, Xinpeng;  Zhou, Yicong; et al.
Favorite | TC[WOS]:15 TC[Scopus]:18  IF:6.3/7.3 | Submit date:2023/01/30
Adversarial Example  Automatic Speech Recognition  Black-box Attack  Monte Carlo Tree Search