![Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA Cyberwarfare / Computational linguistics / Automatic identification and data capture / Computer accessibility / Speech recognition / Mel-frequency cepstrum / Computer security / Denial-of-service attack / Artificial neural network / CMU Sphinx / Vector / CAPTCHA](https://www.pdfsearch.io/img/c9f72f12d19fac1a9f197b14b5c5c8b3.jpg) Date: 2016-06-29 23:07:54Cyberwarfare Computational linguistics Automatic identification and data capture Computer accessibility Speech recognition Mel-frequency cepstrum Computer security Denial-of-service attack Artificial neural network CMU Sphinx Vector CAPTCHA | | Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay ShieldsAdd to Reading ListSource URL: security.cs.georgetown.eduDownload Document from Source Website File Size: 1,10 MBShare Document on Facebook
|