UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems Journal article
Wang, Shen, Zhang, Zhaoyang, Zhu, Guopu, Zhang, Xinpeng, Zhou, Yicong, Huang, Jiwu. Query-Efficient Adversarial Attack With Low Perturbation Against End-to-End Speech Recognition Systems[J]. IEEE Transactions on Information Forensics and Security, 2023, 18, 351 - 364.
Authors:  Wang, Shen;  Zhang, Zhaoyang;  Zhu, Guopu;  Zhang, Xinpeng;  Zhou, Yicong; et al.
Favorite | TC[WOS]:14 TC[Scopus]:18  IF:6.3/7.3 | Submit date:2023/01/30
Adversarial Example  Automatic Speech Recognition  Black-box Attack  Monte Carlo Tree Search  
Brick-up metaheuristic Algorithms Conference paper
Qun Song, Simon Fong. Brick-up metaheuristic Algorithms[C]:IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2016, 583-587.
Authors:  Qun Song;  Simon Fong
Favorite | TC[WOS]:3 TC[Scopus]:5 | Submit date:2019/02/13
Metaheuristic Algorithms  Brick-up System  Ai  Uct  Monte Carlo Tree