[1] |
SZEGEDY C, ZAREMBA W, SUTSKEVER I, et al. Intriguing Properties of Neural Networks[C/OL][2020-07-30].https://arxiv.org/abs/1312.6199v4.
|
[2] |
GROSSE K, PAPEMOT N, MANOHARAN P, et al. Adversarial Perturbations against Deep Neural Networks for Malware Classification[J/OL].[2020-07-30].https://arxiv.org/pdf/1606.04435.pdf.
|
[3] |
CARLINI N, WAGNER D. Audio Adversarial Examples:Targeted Attacks on Speech-to-text [C]//Proceedings of the 2018 IEEE Symposium on Security and Privacy Workshops.Piscataway:IEEE, 2018: 1-7.
|
[4] |
AWNI H, CARL C, JARED C, et al.Deep Speech:Scaling Up End-to-end Speech Recognition[J/OL].[2020-07-30].https://arxiv.org/pdf/1412.5567.pdf.
|
[5] |
CISSE M, ADI Y, NEVEROVA N, et al.Houdini:Fooling Deep Structured Prediction Models[C/OL].[ 2020- 07- 30]. http://papers.nips.cc/paper/7273-houdini-fooling-deep-structured-visual-and-speech-recognition-models-with-adversarial-examples.pdf.
|
[6] |
LEA S, KATHARINA K, STEFFENZ, et al.Adversarial Attacks against Automatic Speech Recognition Systems via Psychoacoustic Hiding[J/OL].[2020-07-30].https://arxiv.org/pdf/1808.05665.pdf.
|
[7] |
YUAN X, CHEN Y, ZHAO Y, et al. Commandersong:a Systematic Approach for Practical Adversarial Voice Recognition [C]//Proceedings of the 2018 27th USENIX Security Symposium.Berkeley:USENIX Association, 2018: 49-64.
|
[8] |
YAKURA H, SAKUMA J.Robust Audio Adversarial Example for a Physical Attack[C/OL] .[2020-07-30].https://arxiv.org/abs/1810.11793v4.
|
[9] |
QIN Y, CARLINI N, GOODFELLOW L, et al. Imperceptible,Robust,and Targeted Adversarial Examples for Automatic Speech Recognition [C]//Proceedings of the 2019 36th International Conference on Machine Learning.Lille:International Machine Learning Society, 2019: 9141-9150.
|
[10] |
BOSI M, GOLDBERG R E.Introduction to Digital Audio Coding and Standards[M/OL].[2020-07-30].https://link.springer.com/book/10.1007%2F978-1-4615-0327-9.
|
[11] |
SHEN J, NGUYEN P, WU Y, et al. Lingvo:a Modular and Scalable Framework for Sequence-to-sequence Modeling[J/OL].[2020-07-30].https://arxiv.org/abs/1902.08295v1.
|
[12] |
LIU X, ZHANG X, WAN K, et al. Weighted-sampling Audio Adversarial Example Attack[J/OL].[2020-07-30].https://arxiv.org/pdf/1901.10300.pdf.
|
[13] |
LI J B, QU S, LI X, et al. Adversarial Music:Real World Audio Adversary against Wake-word Detection System[C/OL].[2020-07-30].https://arxiv.org/abs/1911.00126?context=cs.CR.
|
[14] |
HOCHREITER S, SCHMIDHUBER J. Long Short-term Memory[J]. Neural Computation, 1997,9(8):1735-1780.
doi: 10.1162/neco.1997.9.8.1735
pmid: 9377276
|
[15] |
GRAVES A, FERNANDEZ S, GOMEZ F, et al. Connectionist Temporal Classification:Labelling Unsegmented Sequence Data with Recurrent Neural Networks [C]//Proceedings of the 2006 ACM International Conference on Machine Learning.New York:ACM, 2006: 369-376.
|