Zum Hauptinhalt springen

Showing 1–1 of 1 results for author: Speckemeier, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2102.05431  [pdf, other

    cs.CR cs.LG cs.SD

    Dompteur: Taming Audio Adversarial Examples

    Authors: Thorsten Eisenhofer, Lea Schönherr, Joel Frank, Lars Speckemeier, Dorothea Kolossa, Thorsten Holz

    Abstract: Adversarial examples seem to be inevitable. These specifically crafted inputs allow attackers to arbitrarily manipulate machine learning systems. Even worse, they often seem harmless to human observers. In our digital society, this poses a significant threat. For example, Automatic Speech Recognition (ASR) systems, which serve as hands-free interfaces to many kinds of systems, can be attacked with… ▽ More

    Submitted 3 June, 2021; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: Accepted at USENIX Security Symposium 2021