News
Attacks on speech recognition systems often use adversarial or inaudible commands. However, a challenge is that adversarial perturbations typically fall within the audible frequency range, making it ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results