Zobrazeno 1 - 10
of 127
pro vyhledávání: '"Audio spoofing detection"'
Audio spoofing detection has become increasingly important due to the rise in real-world cases. Current spoofing detectors, referred to as spoofing countermeasures (CM), are mainly trained and focused on audio waveforms with a single speaker and shor
Externí odkaz:
http://arxiv.org/abs/2408.14066
Autor:
Wang, Zhenyu, Hansen, John H. L.
Publikováno v:
IEEE ACCESS 2024
Advances in automatic speaker verification (ASV) promote research into the formulation of spoofing detection systems for real-world applications. The performance of ASV systems can be degraded severely by multiple types of spoofing attacks, namely, s
Externí odkaz:
http://arxiv.org/abs/2408.13341
Autor:
Li, Menglu, Zhang, Xiao-Ping
Explaining the decisions made by audio spoofing detection models is crucial for fostering trust in detection outcomes. However, current research on the interpretability of detection models is limited to applying XAI tools to post-trained models. In t
Externí odkaz:
http://arxiv.org/abs/2406.08825
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Audio has become an increasingly crucial biometric modality due to its ability to provide an intuitive way for humans to interact with machines. It is currently being used for a range of applications, including person authentication to banking to vir
Externí odkaz:
http://arxiv.org/abs/2307.06669
Autor:
Zhenyu Wang, John H. L. Hansen
Publikováno v:
IEEE Access, Vol 12, Pp 99894-99911 (2024)
Advances in automatic speaker verification (ASV) promote research into the formulation of spoofing detection systems for real-world applications. The performance of ASV systems can be degraded severely by multiple types of spoofing attacks, namely, s
Externí odkaz:
https://doaj.org/article/7a662f130dbd43c1962f2d2dd911ac11
Publikováno v:
In Computer Speech & Language June 2024 86
The state-of-art models for speech synthesis and voice conversion are capable of generating synthetic speech that is perceptually indistinguishable from bonafide human speech. These methods represent a threat to the automatic speaker verification (AS
Externí odkaz:
http://arxiv.org/abs/1907.00501
Publikováno v:
IEEE Access. 2019
Automatic speaker verification, like every other biometric system, is vulnerable to spoofing attacks. Using only a few minutes of recorded voice of a genuine client of a speaker verification system, attackers can develop a variety of spoofing attacks
Externí odkaz:
http://arxiv.org/abs/1905.12439
Publikováno v:
IEEE Access, Vol 7, Pp 84229-84241 (2019)
Automatic speaker verification, such as every other biometric system, is vulnerable to spoofing attacks. Using only a few minutes of recorded voice from a genuine client of a speaker verification system, attackers can develop a variety of spoofing at
Externí odkaz:
https://doaj.org/article/172b4332e648418282916656b172c5b5