
arxiv.org/abs/2108.02010
Preview meta tags from the arxiv.org website.
Linked Hostnames
26- 30 links toarxiv.org
- 12 links toinfo.arxiv.org
- 7 links todblp.uni-trier.de
- 2 links tohuggingface.co
- 2 links tosubscribe.sorryapp.com
- 1 link toalphaxiv.org
- 1 link toapi.semanticscholar.org
- 1 link tocore.ac.uk
Thumbnail

Search Engine Appearance
https://arxiv.org/abs/2108.02010
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Abstract page for arXiv paper 2108.02010: On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Bing
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
https://arxiv.org/abs/2108.02010
Abstract page for arXiv paper 2108.02010: On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
DuckDuckGo

On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
Abstract page for arXiv paper 2108.02010: On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
General Meta Tags
22- title[2108.02010] On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
- titleopen search
- titleopen navigation menu
- titlecontact arXiv
- titlesubscribe to arXiv mailings
Open Graph Meta Tags
10- og:typewebsite
- og:site_namearXiv.org
- og:titleOn the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
- og:urlhttps://arxiv.org/abs/2108.02010v1
- og:image/static/browse/0.3.4/images/arxiv-logo-fb.png
Twitter Meta Tags
6- twitter:site@arxiv
- twitter:cardsummary
- twitter:titleOn the Exploitability of Audio Machine Learning Pipelines to...
- twitter:descriptionMachine learning (ML) models are known to be vulnerable to adversarial examples. Applications of ML to voice biometrics authentication are no exception. Yet, the implications of audio adversarial...
- twitter:imagehttps://static.arxiv.org/icons/twitter/arxiv-logo-twitter-square.png
Link Tags
12- apple-touch-icon/static/browse/0.3.4/images/icons/apple-touch-icon.png
- canonicalhttps://arxiv.org/abs/2108.02010
- icon/static/browse/0.3.4/images/icons/favicon-32x32.png
- icon/static/browse/0.3.4/images/icons/favicon-16x16.png
- manifest/static/browse/0.3.4/images/icons/site.webmanifest
Links
74- http://arxiv.org/licenses/nonexclusive-distrib/1.0
- http://gotit.pub/faq
- http://www.bibsonomy.org/BibtexHandler?requTask=upload&url=https://arxiv.org/abs/2108.02010&description=On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples
- https://alphaxiv.org
- https://api.semanticscholar.org/arXiv:2108.02010