Zobrazeno 1 - 10
of 443
pro vyhledávání: '"Malik, Khalid"'
Publikováno v:
Journal of Medical Internet Research, Vol 22, Iss 10, p e19810 (2020)
BackgroundAutomatic text summarization (ATS) enables users to retrieve meaningful evidence from big data of biomedical repositories to make complex clinical decisions. Deep neural and recurrent networks outperform traditional machine-learning techniq
Externí odkaz:
https://doaj.org/article/567d66d28e46452e8f614eef1e4b1a7e
Autor:
Khan, Awais, Malik, Khalid Mahmood
The Automatic Speaker Verification (ASV) system is vulnerable to fraudulent activities using audio deepfakes, also known as logical-access voice spoofing attacks. These deepfakes pose a concerning threat to voice biometrics due to recent advancements
Externí odkaz:
http://arxiv.org/abs/2310.03856
Autor:
Khan, Awais, Malik, Khalid Mahmood
Automatic Speaker Verification (ASV) systems are increasingly used in voice bio-metrics for user authentication but are susceptible to logical and physical spoofing attacks, posing security risks. Existing research mainly tackles logical or physical
Externí odkaz:
http://arxiv.org/abs/2309.10560
Voice spoofing attacks pose a significant threat to automated speaker verification systems. Existing anti-spoofing methods often simulate specific attack types, such as synthetic or replay attacks. However, in real-world scenarios, the countermeasure
Externí odkaz:
http://arxiv.org/abs/2309.09837
Malicious actors may seek to use different voice-spoofing attacks to fool ASV systems and even use them for spreading misinformation. Various countermeasures have been proposed to detect these spoofing attacks. Due to the extensive work done on spoof
Externí odkaz:
http://arxiv.org/abs/2210.00417
Publikováno v:
In Information Fusion August 2024 108
Easy access to audio-visual content on social media, combined with the availability of modern tools such as Tensorflow or Keras, open-source trained models, and economical computing infrastructure, and the rapid evolution of deep-learning (DL) method
Externí odkaz:
http://arxiv.org/abs/2103.00484
Multi-recipient cryptographic schemes provide secure communication, between one sender and multiple recipients, in a multi-party group. Providing secure multi-party communication is very challenging, especially in dynamic networks. Existing multi-rec
Externí odkaz:
http://arxiv.org/abs/2002.06713
Publikováno v:
In Expert Systems With Applications 15 December 2023 233
Autor:
Arslan Habib, Khalid Anjum, Riffat Iqbal, Ghulam Jaffar, Zeeshan Ashraf, Malik Khalid, Muhammad Taj, Syeda Zainab, Muhammad Umair, Muhammad Zohaib, Tabinda Khalid
Publikováno v:
Iranian Journal of Immunology, Vol 20, Iss 1, Pp 1-15 (2023)
The most effective method to minimize the prevalence of infectious diseases is vaccination. Vaccines enhance immunity and provide protection against different kinds of infections. Subunit vaccines are safe and less toxic, but due to their lower immun
Externí odkaz:
https://doaj.org/article/f5e1dec7ea53422480d561485b2cf9d0