N. Carlini and D. Wagner, ′′Audio adversarial examples: Targeted attacks on speech-to-text,′′ in 2018 IEEE Security and Privacy Workshops (SPW), pp. 1-7, IEEE, 2018.
N. Carlini, P. Mishra, T. Vaidya, Y. Zhang, M. Sherr, C. Shields, D. Wagner, and W. Zhou, ′′Hidden voice commands,′′ 25th USENIX Security Symposium (USENIX Security 16), pp. 513-530, 2016