Abstract: Deep neural networks yield desirable performance in text, image, and speech classification. However, these networks are vulnerable to adversarial examples. An adversarial example is a sample ...
This repository contains a simple implementation of a linear programming solver, in particular for the primal and dual simplex method in tableau form and the application of Gomory's cut in case of ...
Abstract: The current automatic speech recognition (ASR) technology has achieved remarkable success, but it is vulnerable to adversarial attacks. To solve the problem that existing adversarial attack ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results