Corresponding code to the paper "Inaudible Voice Commands" https://arxiv.org/abs/1708.07238
To generate your own attack ultrasound file, follow "ultrasound_attack.m"
- We provided example audio files in the folder 'example_audios'
- We created an attack demo on youtube
- McAfee had a podcast episode about our work