Pinned Repositories
adversarial-attack-on-GMM-i-vector-based-speaker-verification-systems
Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078
Adversarial-Attack-on-Joint-System-of-ASV-and-CM
Exploring Waveform Level Universal Adversarial Attack on Real-World Joint Systems of Automatic Speaker Verification and Spoofing Countermeasure
adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference
Attack_practical_asv
ICASSP 2021 accepted paper
audio_adversarial_examples
Targeted Adversarial Examples on Speech-to-Text systems
Be-My-Girlfriend
抖音爆火 C# 表白小程序
cleverhans
An adversarial example library for constructing attacks, building defenses, and benchmarking both
crepe
CREPE: A Convolutional REpresentation for Pitch Estimation -- pre-trained model (ICASSP 2018)
FAKEBOB
Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems"
gard-adversarial-speaker-id
Adversarial attack and defense strategies for deep speaker recognition systems
zxynbnb's Repositories
zxynbnb/adversarial-attack-on-GMM-i-vector-based-speaker-verification-systems
Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078
zxynbnb/adversarial-robustness-toolbox
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference
zxynbnb/audio_adversarial_examples
Targeted Adversarial Examples on Speech-to-Text systems
zxynbnb/cleverhans
An adversarial example library for constructing attacks, building defenses, and benchmarking both
zxynbnb/crepe
CREPE: A Convolutional REpresentation for Pitch Estimation -- pre-trained model (ICASSP 2018)
zxynbnb/FAKEBOB
Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems"
zxynbnb/gard-adversarial-speaker-id
Adversarial attack and defense strategies for deep speaker recognition systems
zxynbnb/Java
27天成为Java大神
zxynbnb/kaldi
This is the official location of the Kaldi project.
zxynbnb/kaldi-io-for-python
Python functions for reading kaldi data formats. Useful for rapid prototyping with python.
zxynbnb/learning-to-fool-the-speaker-recognition
code for paper "learning to fool the speaker recognition"
zxynbnb/pcmelgan
zxynbnb/Speaker-Diarization
speaker diarization by uis-rnn and speaker embedding by vgg-speaker-recognition
zxynbnb/speaker-recognition
A Speaker Recognition System
zxynbnb/tf-kaldi-speaker
Neural speaker recognition/verification system based on Kaldi and Tensorflow
zxynbnb/uis-rnn
This is the library for the Unbounded Interleaved-State Recurrent Neural Network (UIS-RNN) algorithm, corresponding to the paper Fully Supervised Speaker Diarization.
zxynbnb/AAA-Pix2pix
Adversarial Attack Zoo and Victim Model Zoo for general Pixel-to-Pixel Tasks
zxynbnb/AdvAttacksASVspoof
This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".
zxynbnb/AdvBox
Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and Advbox can benchmark the robustness of machine learning models. Advbox give a command line tool to generate adversarial examples with Zero-Coding.
zxynbnb/asv-cm-reinforce
Optimizing speaker verification and spoofing countermeasure systems together with REINFORCE
zxynbnb/asv-subtools
An Open Source Tools for Speaker Recognition
zxynbnb/Automatic-Modulation-Classification
Some Code for Master Thesis - Research on Deep Learning Based Modulation Recognition Technologies
zxynbnb/limited-blackbox-attacks
Code for "Black-box Adversarial Attacks with Limited Queries and Information" (http://arxiv.org/abs/1804.08598)
zxynbnb/Non-Targeted-Adversarial-Attacks
A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition
zxynbnb/one-pixel-attack-keras
Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNet
zxynbnb/robust_audio_ae
Robust Audio Adversarial Example for a Physical Attack
zxynbnb/SpecAugment
A Implementation of SpecAugment with Tensorflow & Pytorch, introduced by Google Brain
zxynbnb/Targeted-Universal-Adversarial-Perturbation
Extended Universal Adversarial Perturbation to targeted attack.
zxynbnb/towards-resistant-audio-adversarial-examples
Generation tool for offset-resistant audio adversarial examples against Deepspeech
zxynbnb/Translation-Invariant-Attacks
The translation-invariant adversarial attack method to improve the transferability of adversarial examples.