Abstract
In a real-world cloud server, a speech signal is prone to suffer various attacks, such as malicious muting and tampering. In such a context, the priva......
小提示:本篇文献需要登录阅读全文,点击跳转登录