2 code implementations • 14 Oct 2020 • Tom Dörr, Karla Markert, Nicolas M. Müller, Konstantin Böttinger
We devise an approach to mitigate this flaw and find that our method improves generation of adversarial examples with varying offsets.
Adversarial Attack speech-recognition +1