1. Hojjat Aghakhani , Lea Schönherr , Thorsten Eisenhofer , Dorothea Kolossa , Thorsten Holz , Christopher Kruegel , and Giovanni Vigna . 2020. VenoMave: Targeted Poisoning Against Speech Recognition. arXiv preprint arXiv:2010.10682 ( 2020 ). Hojjat Aghakhani, Lea Schönherr, Thorsten Eisenhofer, Dorothea Kolossa, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. 2020. VenoMave: Targeted Poisoning Against Speech Recognition. arXiv preprint arXiv:2010.10682 (2020).
2. Image method for efficiently simulating small‐room acoustics
3. Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou . 2016 . Hidden voice commands . In Proc. of USENIX Security Symposium. 513--530 . Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In Proc. of USENIX Security Symposium. 513--530.
4. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
5. Xinyun Chen , Chang Liu , Bo Li , Kimberly Lu , and Dawn Song . 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 ( 2017 ). Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017).