# voice-cloning
標記為「voice-cloning」的 7 篇文章
Voice Agent Attacks
Attack techniques targeting voice-controlled AI agents, including adversarial audio injection, ultrasonic commands, voice cloning for authentication bypass, and conversation hijacking in voice-first AI systems.
Audio & Speech Adversarial Attacks
Adversarial attacks against speech-enabled AI systems, covering ultrasonic injection, ASR adversarial noise, hidden voice commands, voice cloning for authentication bypass, and real-time audio manipulation.
Voice Cloning & Deepfake Audio
Voice cloning for social engineering against AI systems, voice authentication bypass, speaker verification attacks, and detection techniques.
Voice 代理 攻擊s
攻擊 techniques targeting voice-controlled AI agents, including adversarial audio injection, ultrasonic commands, voice cloning for authentication bypass, and conversation hijacking in voice-first AI systems.
Audio & Speech Adversarial 攻擊s
Adversarial attacks against speech-enabled AI systems, covering ultrasonic injection, ASR adversarial noise, hidden voice commands, voice cloning for authentication bypass, and real-time audio manipulation.
音訊與語音模型
語音辨識與音訊處理 AI 的安全——涵蓋對抗性音訊、語音複製風險、隱藏命令與音訊注入技術。
語音複製與深偽音訊
以語音複製對 AI 系統進行社交工程、繞過語音驗證、對語者驗證系統的攻擊,以及偵測技術。