A collection of examples demonstrating the use of the Zephyr RTOS. The examples are arranged into repositories, where each repository focuses on a particular piece of functionality. It is assumed that ...
Abstract: The current automatic speech recognition (ASR) technology has achieved remarkable success, but it is vulnerable to adversarial attacks. To solve the problem that existing adversarial attack ...
Abstract: Deep neural network-based classifiers are prone to errors when processing adversarial examples (AEs). AEs are minimally perturbed input data undetectable to humans posing significant risks ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果