no code implementations • 28 Jun 2023 • Zhe Ye, Terui Mao, Li Dong, Diqun Yan
This work explores a backdoor attack that utilizes sample-specific triggers based on voice conversion.
Backdoor Attack Voice Conversion