Follow
Guangke Chen
Guangke Chen
Verified email at shanghaitech.edu.cn - Homepage
Title
Cited by
Cited by
Year
Who is real bob? adversarial attacks on speaker recognition systems
G Chen, S Chenb, L Fan, X Du, Z Zhao, F Song, Y Liu
2021 IEEE Symposium on Security and Privacy (SP), 694-711, 2021
1932021
Attack as defense: Characterizing adversarial examples using robustness
Z Zhao, G Chen, J Wang, Y Yang, F Song, J Sun
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
292021
Towards understanding and mitigating audio adversarial examples for speaker recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang
IEEE Transactions on Dependable and Secure Computing, 2022
252022
BDD4BNN: a BDD-based quantitative analysis framework for binarized neural networks
Y Zhang, Z Zhao, G Chen, F Song, T Chen
International Conference on Computer Aided Verification, 175-200, 2021
252021
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
G Chen, Z Zhao, F Song, S Chen, L Fan, Y Liu
IEEE Transactions on Dependable and Secure Computing, 2022
182022
QVIP: an ILP-based formal verification approach for quantized neural networks
Y Zhang, Z Zhao, G Chen, F Song, M Zhang, T Chen, J Sun
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
132022
SEC4SR: a security analysis platform for speaker recognition
G Chen, Z Zhao, F Song, S Chen, L Fan, Y Liu
arXiv preprint arXiv:2109.01766, 2021
132021
CLEVEREST: accelerating CEGAR-based neural network verification via adversarial attacks
Z Zhao, Y Zhang, G Chen, F Song, T Chen, J Liu
International Static Analysis Symposium, 449-473, 2022
82022
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
G Chen, Y Zhang, Z Zhao, F Song
32nd USENIX Security Symposium 2023, 2437-2454, 2023
72023
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
G Chen, Y Zhang, Z Zhao, F Song
arXiv preprint arXiv:2305.14097, 2023
72023
Precise quantitative analysis of binarized neural networks: a BDD-based approach
Y Zhang, Z Zhao, G Chen, F Song, T Chen
ACM Transactions on Software Engineering and Methodology 32 (3), 1-51, 2023
42023
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
G Chen, Y Zhang, F Song
the 31st Network and Distributed System Security (NDSS) Symposium 2024, 2024
12024
Attack as detection: Using adversarial attack methods to detect abnormal examples
Z Zhao, G Chen, T Liu, T Li, F Song, J Wang, J Sun
ACM Transactions on Software Engineering and Methodology, 2023
12023
A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion
G Chen, Y Zhang, F Song, T Wang, X Du, Y Liu
arXiv preprint arXiv:2401.17133, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–14