variants of indirect learning based on the Least Squares Method (LSM) and the Recursive Least Squares Method (RLSM) are considered for digital predistortion of nonlinear distortions in complex composite signals with h...
详细信息
In 2022, lots of tweets consisting of emoji squares and a few words describing moods emerge on Twitter. In fact, it is the result of a word guessing game called Wordle. In order to figure out the relationship among wo...
详细信息
Speaker Recognition systems (SRSs) are gradually introducing Deep Neural Networks (DNNs) as their core architecture, while attackers exploit the weakness of DNNs to launch adversarial attacks. Previous studies generat...
详细信息
ISBN:
(数字)9789819708086
ISBN:
(纸本)9789819708079;9789819708086
Speaker Recognition systems (SRSs) are gradually introducing Deep Neural Networks (DNNs) as their core architecture, while attackers exploit the weakness of DNNs to launch adversarial attacks. Previous studies generate adversarial examples by injecting the human-imperceptible noise into the gradients of audio data, which is termed as white-box attacks. However, these attacks are impractical in real-world scenarios because they have a high dependency on the internal information of the target classifier. To address this constraint, this study proposes a method applying in a black-box condition which only permits the attacker to estimate the internal information by interacting with the model through its inputs and outputs. We use the idea of the substitution-based method and transfer-based method to train various surrogate models for imitating the target models. Our methods combine the surrogate models with white-box methods like Momentum Iterative Fast Gradient Sign Method (MI-FGSM) and Enhanced Momentum Iterative Fast Gradient Sign Method (EMI-FGSM) to boost the performance of the adversarial attacks. Furthermore, a transferability analysis is conducted on multiple models under cross-architecture, cross-feature and cross-architecture-feature conditions. Additionally, frequency analysis also provides us with valuable findings about adjusting the parameters in attack algorithms. Massive experiments validate that our attack yields a prominent performance compared to previous studies.
Researchers and algorithm developers have always strived to make tracking more accurate than before, by developing deferents algorithms that prove their efficiency and effectiveness in international competitions (vOT,...
详细信息
With the continuous advancement of smart city construction, autonomous driving technology is playing an increasingly important role in urban traffic systems. This study aims to explore the development and optimization...
详细信息
Investors and stakeholders have intensified the demand for responsible and sustainable business practices. However, traditional ESG ratings suffer from transparency, comparability, and consistency challenges, limiting...
详细信息
A short wave infrared range (SWIR) imaging system using a lens, rotating substrate with applied Walsh matrices, single photodiode and a 10-bit ADC has been proposed. The possibility of using the Walsh function for enc...
详细信息
This paper presents the design of a compact wearable device for visually impaired individuals. It features facial recognition to identify friends and relatives with real-time database updating. Additionally, it includ...
详细信息
Coherent optical communication system (COCS) can achieve high-speed and long-distance transmission, but their structure is complex and costly. In coherent optical communication, problems such as link damage caused by ...
详细信息
In the context of optical signal processing, quantum and quantum-inspired machine learning algorithms have massive potential for deployment. One of the applications is in error correction protocols for the received no...
详细信息
暂无评论