Speaker recognition based on deep learning: An overview
Speaker recognition is a task of identifying persons from their voices. Recently, deep
learning has dramatically revolutionized speaker recognition. However, there is lack of …
learning has dramatically revolutionized speaker recognition. However, there is lack of …
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
The ASVspoof initiative was conceived to spearhead research in anti-spoofing for automatic
speaker verification (ASV). This paper describes the third in a series of bi-annual …
speaker verification (ASV). This paper describes the third in a series of bi-annual …
Replay and synthetic speech detection with res2net architecture
Existing approaches for replay and synthetic speech detection still lack generalizability to
unseen spoofing attacks. This work proposes to leverage a novel model structure, so-called …
unseen spoofing attacks. This work proposes to leverage a novel model structure, so-called …
Light convolutional neural network with feature genuinization for detection of synthetic speech attacks
Modern text-to-speech (TTS) and voice conversion (VC) systems produce natural sounding
speech that questions the security of automatic speaker verification (ASV). This makes …
speech that questions the security of automatic speaker verification (ASV). This makes …
Channel-wise gated res2net: Towards robust detection of synthetic speech attacks
Existing approaches for anti-spoofing in automatic speaker verification (ASV) still lack
generalizability to unseen attacks. The Res2Net approach designs a residual-like …
generalizability to unseen attacks. The Res2Net approach designs a residual-like …
Deepfake audio detection by speaker verification
Thanks to recent advances in deep leaning, sophisticated generation tools exist, nowadays,
that produce extremely realistic synthetic speech. However, malicious uses of such tools are …
that produce extremely realistic synthetic speech. However, malicious uses of such tools are …
Predictions of subjective ratings and spoofing assessments of voice conversion challenge 2020 submissions
The Voice Conversion Challenge 2020 is the third edition under its flagship that promotes
intra-lingual semiparallel and cross-lingual voice conversion (VC). While the primary …
intra-lingual semiparallel and cross-lingual voice conversion (VC). While the primary …
[PDF][PDF] Known-unknown data augmentation strategies for detection of logical access, physical access and speech deepfake attacks: ASVspoof 2021
RK Das - Proc. 2021 Edition of the Automatic Speaker …, 2021 - isca-archive.org
The rise in demand of voice biometric systems also increases the threat from various kinds
of spoofing attacks from unauthorized users. The latest ASVspoof 2021 challenge devotes to …
of spoofing attacks from unauthorized users. The latest ASVspoof 2021 challenge devotes to …
Inaudible adversarial perturbations for targeted attack in speaker recognition
Speaker recognition is a popular topic in biometric authentication and many deep learning
approaches have achieved extraordinary performances. However, it has been shown in …
approaches have achieved extraordinary performances. However, it has been shown in …