no code implementations • 2 Sep 2022 • Elizabeth Coda, Brad Clymer, Chance DeSmet, Yijing Watkins, Michael Girard
A wide variety of adversarial attacks have been proposed and explored using image and audio data.
speech-recognition Speech Recognition +2