上一条: Transmission distortion modeling for unequal importance judgment
下一条: A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network