1. Bao, Y., Liang, R., Cong, Y.: Research progress on key technologies of audio forensics. J. Data Acquis. Process. 31(2), 252–259 (2016)
2. Carlini, N., Wagner, D.: Audio adversarial examples: targeted attacks on speech-to-text. In: 2018 IEEE security and privacy workshops (SPW), pp. 1–7. IEEE (2018)
3. Dong, Y., et al.: Boosting adversarial attacks with momentum. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 9185–9193 (2018)
4. Fontani, M., Barni, M.: Hiding traces of median filtering in digital images. In: 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO), pp.1239–1243. IEEE (2012)
5. Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)