All Stories

  1. Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks
  2. Detecting inaudible BackDoor messages using deep learning