Artificial intelligence security: Threats and countermeasures
In recent years, with rapid technological advancement in both computing hardware and
algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human …
algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human …
A comprehensive review on deep learning algorithms: Security and privacy issues
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …
various complicated tasks that begin to modify and improve with experiences. It has become …
Deep transfer learning for automatic speech recognition: Towards better generalization
Automatic speech recognition (ASR) has recently become an important challenge when
using deep learning (DL). It requires large-scale training datasets and high computational …
using deep learning (DL). It requires large-scale training datasets and high computational …
Far-field automatic speech recognition
The machine recognition of speech spoken at a distance from the microphones, known as
far-field automatic speech recognition (ASR), has received a significant increase in attention …
far-field automatic speech recognition (ASR), has received a significant increase in attention …
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Rethinking evaluation in asr: Are our models robust enough?
T Likhomanenko, Q Xu, V Pratap, P Tomasello… - ar** artificial learning systems that can understand and generate natural language
has been one of the long-standing goals of artificial intelligence. Recent decades have …
has been one of the long-standing goals of artificial intelligence. Recent decades have …
Generating adversarial examples for holding robustness of source code processing models
Automated processing, analysis, and generation of source code are among the key activities
in software and system lifecycle. To this end, while deep learning (DL) exhibits a certain …
in software and system lifecycle. To this end, while deep learning (DL) exhibits a certain …
Beyond pixel norm-balls: Parametric adversaries using an analytically differentiable renderer
Many machine learning image classifiers are vulnerable to adversarial attacks, inputs with
perturbations designed to intentionally trigger misclassification. Current adversarial methods …
perturbations designed to intentionally trigger misclassification. Current adversarial methods …
Towards robustness of deep program processing models—detection, estimation, and enhancement
Deep learning (DL) has recently been widely applied to diverse source code processing
tasks in the software engineering (SE) community, which achieves competitive performance …
tasks in the software engineering (SE) community, which achieves competitive performance …