Practical Hidden Voice Attacks Against Speech and Speaker Recognition Systems
Network and Distributed System Security Symposium(2019)
Key words
Speaker Verification,Acoustic Modeling,Automatic Speech Recognition,End-to-End Speech Recognition,Sensor Pattern Noise
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined