Fig. 4From: Towards the transferable audio adversarial attack via ensemble methodsAdversarial sample generations based on ensemble attacksBack to article page