Follow
Guangke Chen
Guangke Chen
Verified email at shanghaitech.edu.cn - Homepage
Title
Cited by
Cited by
Year
Who is real bob? adversarial attacks on speaker recognition systems
G Chen, S Chenb, L Fan, X Du, Z Zhao, F Song, Y Liu
2021 IEEE Symposium on Security and Privacy (SP), 694-711, 2021
1062021
Attack as defense: Characterizing adversarial examples using robustness
Z Zhao, G Chen, J Wang, Y Yang, F Song, J Sun
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
202021
BDD4BNN: A BDD-Based Quantitative Analysis Framework for Binarized Neural Networks
Y Zhang, Z Zhao, G Chen, F Song, T Chen
Computer Aided Verification: 33rd International Conference, CAV 2021 …, 2021
122021
SEC4SR: a security analysis platform for speaker recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, Y Liu
arXiv preprint arXiv:2109.01766, 2021
92021
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
G Chen, Z Zhao, F Song, S Chen, L Fan, Y Liu
IEEE Transactions on Dependable and Secure Computing, 2022
72022
Towards understanding and mitigating audio adversarial examples for speaker recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang
IEEE Transactions on Dependable and Secure Computing, 2022
32022
QVIP: an ILP-based formal verification approach for quantized neural networks
Y Zhang, Z Zhao, F Song, M Zhang, T Chen, J Sun
arXiv preprint arXiv:2212.11138, 2022
22022
CLEVEREST: Accelerating CEGAR-based Neural Network Verification via Adversarial Attacks
Z Zhao, Y Zhang, G Chen, F Song, T Chen, J Liu
Static Analysis: 29th International Symposium, SAS 2022, Auckland, New …, 2022
12022
Supplemental Material of The Article Entitled Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang
IEEE Transactions on Dependable and Secure Computing, 1-17, 2022
2022
Precise Quantitative Analysis of Binarized Neural Networks: A BDD-based Approach
Y Zhang, Z Zhao, G Chen, F Song, T Chen
ACM Transactions on Software Engineering and Methodology, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–10