Back to Results
First PageMeta Content
Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA


Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields
Add to Reading List

Document Date: 2016-06-29 23:07:54


Open Document

File Size: 1,10 MB

Share Result on Facebook