-
3
-
-
67650803663
-
Combining statistical parameteric speech synthesis and unit-selection for automatic voice cloning
-
M. P. Aylett and J. Yamagishi. Combining Statistical Parameteric Speech Synthesis and Unit-Selection for Automatic Voice Cloning. In LangTech, 2008.
-
(2008)
LangTech
-
-
Aylett, M.P.1
Yamagishi, J.2
-
4
-
-
78049530550
-
The security of machine learning
-
M. Barreno, B. Nelson, A. D. Joseph, and J. Tygar. The security of machine learning. Machine Learning, 81(2):121–148, 2010.
-
(2010)
Machine Learning
, vol.81
, Issue.2
, pp. 121-148
-
-
Barreno, M.1
Nelson, B.2
Joseph, A.D.3
Tygar, J.4
-
5
-
-
84954340772
-
Evasion attacks against machine learning at test time
-
B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. Šrndić, P. Laskov, G. Giacinto, and F. Roli. Evasion Attacks against Machine Learning at Test Time. In Machine Learning and Knowledge Discovery in Databases, 2013.
-
(2013)
Machine Learning and Knowledge Discovery in Databases
-
-
Biggio, B.1
Corona, I.2
Maiorca, D.3
Nelson, B.4
Šrndić, N.5
Laskov, P.6
Giacinto, G.7
Roli, F.8
-
21
-
-
84910596985
-
A11Y attacks: Exploiting accessibility in operating systems
-
November
-
Y. Jang, C. Song, S. P. Chung, T. Wang, and W. Lee. A11y Attacks: Exploiting Accessibility in Operating Systems. In ACM Conference on Computer and Communications Security (CCS), November 2014.
-
(2014)
ACM Conference on Computer and Communications Security (CCS)
-
-
Jang, Y.1
Song, C.2
Chung, S.P.3
Wang, T.4
Lee, W.5
-
22
-
-
84888987784
-
Approaches to adversarial drift
-
A. Kantchelian, S. Afroz, L. Huang, A. C. Islam, B. Miller, M. C. Tschantz, R. Greenstadt, A. D. Joseph, and J. D. Tygar. Approaches to Adversarial Drift. In ACM Workshop on Artificial Intelligence and Security, 2013.
-
(2013)
ACM Workshop on Artificial Intelligence and Security
-
-
Kantchelian, A.1
Afroz, S.2
Huang, L.3
Islam, A.C.4
Miller, B.5
Tschantz, M.C.6
Greenstadt, R.7
Joseph, A.D.8
Tygar, J.D.9
-
23
-
-
84939445531
-
Iemi threats for information security: Remote command injection on modern smartphones
-
C. Kasmi and J. Lopes Esteves. Iemi threats for information security: Remote command injection on modern smartphones. IEEE Transactions on Electromagnetic Compatibility, PP(99):1–4, 2015.
-
(2015)
IEEE Transactions on Electromagnetic Compatibility
, Issue.99
, pp. 1-4
-
-
Kasmi, C.1
Lopes Esteves, J.2
-
24
-
-
84889792599
-
Design of the CMU SPHINX-4 decoder
-
P. Lamere, P. Kwok, W. Walker, E. Gouvea, R. Singh, B. Raj, and P. Wolf. Design of the CMU Sphinx-4 Decoder. In Eighth European Conference on Speech Communication and Technology, 2003.
-
(2003)
Eighth European Conference on Speech Communication and Technology
-
-
Lamere, P.1
Kwok, P.2
Walker, W.3
Gouvea, E.4
Singh, R.5
Raj, B.6
Wolf, P.7
-
28
-
-
0015130194
-
Facilitation in recognizing pairs of words: Evidence of a dependence between retrieval operations
-
D. E. Meyer and R. W. Schvaneveldt. Facilitation in Recognizing Pairs of Words: Evidence of a Dependence between Retrieval Operations. Journal of Experimental Psychology, 90(2):227, 1971.
-
(1971)
Journal of Experimental Psychology
, vol.90
, Issue.2
, pp. 227
-
-
Meyer, D.E.1
Schvaneveldt, R.W.2
-
29
-
-
85073169436
-
-
Linguistic Data Consortium, item LDC2005S30. University of Pennsylvania.
-
J. Morgan, S. LaRocca, S. Bellinger, and C. C. Ruscelli. West Point Company G3 American English Speech. Linguistic Data Consortium, item LDC2005S30. University of Pennsylvania. Available at https://catalog.ldc.upenn.edu/LDC2005S30, 2005.
-
(2005)
West Point Company G3 American English Speech
-
-
Morgan, J.1
LaRocca, S.2
Bellinger, S.3
Ruscelli, C.C.4
-
30
-
-
85080380878
-
-
NLP Captcha. http://nlpcaptcha.in/.
-
NLP Captcha
-
-
-
31
-
-
85029329302
-
-
arXiv preprint
-
N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami. The limitations of deep learning in adversarial settings. arXiv preprint arXiv:1511.07528, 2015.
-
(2015)
The Limitations of Deep Learning in Adversarial Settings
-
-
Papernot, N.1
McDaniel, P.2
Jha, S.3
Fredrikson, M.4
Celik, Z.B.5
Swami, A.6
-
33
-
-
85080368707
-
-
reCAPTCHA. http://google.com/recaptcha.
-
-
-
-
34
-
-
85009153774
-
Google voice search: Faster and more accurate
-
H. Sak, A. Senior, K. Rao, F. Beaufays, and J. Schalkwyk. Google Voice Search: Faster and More Accurate, 2015. Google Research Blog post. Available at http://googleresearch.blogspot.com/2015/09/googlevoice-search-faster-and-more.html.
-
(2015)
Google Research Blog Post
-
-
Sak, H.1
Senior, A.2
Rao, K.3
Beaufays, F.4
Schalkwyk, J.5
-
35
-
-
34548786769
-
The emperor’s new security indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
S. Schechter, R. Dhamija, A. Ozment, and I. Fischer. The Emperor’s New Security Indicators: An Evaluation of Website Authentication and the Effect of Role Playing on Usability Studies. In IEEE Symposium on Security and Privacy (Oakland), 2007.
-
(2007)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Schechter, S.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
36
-
-
79959466110
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X.-Y. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. In Network and Distributed System Security Symposium (NDSS), 2011.
-
(2011)
Network and Distributed System Security Symposium (NDSS)
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.-Y.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
37
-
-
84926351578
-
Crying Wolf: An empirical study of SSL warning effectiveness
-
J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX Security Symposium (USENIX), 2009.
-
(2009)
USENIX Security Symposium (USENIX)
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
38
-
-
84925331214
-
-
arXiv preprint
-
C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing Properties of Neural Networks. arXiv preprint arXiv:1312.6199, 2013.
-
(2013)
Intriguing Properties of Neural Networks
-
-
Szegedy, C.1
Zaremba, W.2
Sutskever, I.3
Bruna, J.4
Erhan, D.5
Goodfellow, I.6
Fergus, R.7
-
40
-
-
80052645594
-
Adversarial machine learning
-
J. Tygar. Adversarial Machine Learning. IEEE Internet Computing, 15(5): 4–6, 2011.
-
(2011)
IEEE Internet Computing
, vol.15
, Issue.5
, pp. 4-6
-
-
Tygar, J.1
-
42
-
-
0032141206
-
Cepstral domain segmental feature vector normalization for noise robust speech recognition
-
O. Viikki and K. Laurila. Cepstral Domain Segmental Feature Vector Normalization for Noise Robust Speech Recognition. Speech Communication, 25(13):133–147, 1998.
-
(1998)
Speech Communication
, vol.25
, Issue.13
, pp. 133-147
-
-
Viikki, O.1
Laurila, K.2
-
43
-
-
78650096100
-
-
George Mason University
-
S. H. Weinberger. Speech Accent Archive. George Mason University, 2015. Available at http://accent.gmu.edu.
-
(2015)
Speech Accent Archive
-
-
Weinberger, S.H.1
|