1. Dario Amodei et al. 2016. Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin . In Proceedings of the 33nd International Conference on Machine Learning (JMLR Workshop and Conference Proceedings , Vol. 48). 173-- 182 . Dario Amodei et al. 2016. Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin. In Proceedings of the 33nd International Conference on Machine Learning (JMLR Workshop and Conference Proceedings, Vol. 48). 173--182.
2. Arduino. 2021. Arduino. https://www.arduino.cc/ Arduino. 2021. Arduino. https://www.arduino.cc/
3. the proceedings of the 2008 International Conference on SCSS;Bachu Rajesh,2008
4. Ruud Bolle et al. 1998 . Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society . Kluwer Academic Publishers, USA. Ruud Bolle et al. 1998. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society. Kluwer Academic Publishers, USA.
5. Nicholas Carlini and David A . Wagner . 2018 . Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR ( 2018). Nicholas Carlini and David A. Wagner. 2018. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. CoRR (2018).