1. Martín Abadi Paul Barham Jianmin Chen Zhifeng Chen Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Geoffrey Irving Michael Isard Manjunath Kudlur Josh Levenberg Rajat Monga Sherry Moore Derek G. Murray Benoit Steiner Paul Tucker Vijay Vasudevan Pete Warden Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2016. TensorFlow: A system for large-scale machine learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI'16). USENIX Association Savannah GA 265--283. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/abadi
2. Practical hidden voice attacks against speech and speaker recognition systems;Abdullah Hadi;Network and Distributed System Security Symposium (NDSS'19),2019
3. H. Abdullah, M. Rahman, W. Garcia, K. Warren, A. Swarnim Yadav, T. Shrimpton, and P. Traynor. 2021. Hear “No Evil”, see “kenansville”*: Efficient and transferable black-box attacks on speech recognition and voice identification systems. In Proceedings of the 2021 2021 IEEE Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos, CA, USA, 142–159. DOI:10.1109/SP40001.2021.00009
4. Hadi Abdullah Kevin Warren Vincent Bindschaedler Nicolas Papernot and Patrick Traynor. 2021. SoK: The faults in our ASRs: An overview of attacks against automatic speech recognition and speaker identification systems. In IEEE Symposium on Security and Privacy (IEEE S&P).
5. Discrete cosine transform;Ahmed Nasir;IEEE Transactions on Computers,1974