Speaker recognition based on deep learning: An overview

Z Bai, XL Zhang - Neural Networks, 2021 - Elsevier
Speaker recognition is a task of identifying persons from their voices. Recently, deep
learning has dramatically revolutionized speaker recognition. However, there is lack of …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech

A Nautsch, X Wang, N Evans… - … and Identity Science, 2021 - ieeexplore.ieee.org
The ASVspoof initiative was conceived to spearhead research in anti-spoofing for automatic
speaker verification (ASV). This paper describes the third in a series of bi-annual …

Replay and synthetic speech detection with res2net architecture

X Li, N Li, C Weng, X Liu, D Su, D Yu… - ICASSP 2021-2021 …, 2021 - ieeexplore.ieee.org
Existing approaches for replay and synthetic speech detection still lack generalizability to
unseen spoofing attacks. This work proposes to leverage a novel model structure, so-called …

Light convolutional neural network with feature genuinization for detection of synthetic speech attacks

Z Wu, RK Das, J Yang, H Li - arXiv preprint arXiv:2009.09637, 2020 - arxiv.org
Modern text-to-speech (TTS) and voice conversion (VC) systems produce natural sounding
speech that questions the security of automatic speaker verification (ASV). This makes …

Channel-wise gated res2net: Towards robust detection of synthetic speech attacks

X Li, X Wu, H Lu, X Liu, H Meng - arXiv preprint arXiv:2107.08803, 2021 - arxiv.org
Existing approaches for anti-spoofing in automatic speaker verification (ASV) still lack
generalizability to unseen attacks. The Res2Net approach designs a residual-like …

Deepfake audio detection by speaker verification

A Pianese, D Cozzolino, G Poggi… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Thanks to recent advances in deep leaning, sophisticated generation tools exist, nowadays,
that produce extremely realistic synthetic speech. However, malicious uses of such tools are …

Predictions of subjective ratings and spoofing assessments of voice conversion challenge 2020 submissions

RK Das, T Kinnunen, WC Huang, Z Ling… - arXiv preprint arXiv …, 2020 - arxiv.org
The Voice Conversion Challenge 2020 is the third edition under its flagship that promotes
intra-lingual semiparallel and cross-lingual voice conversion (VC). While the primary …

[PDF][PDF] Known-unknown data augmentation strategies for detection of logical access, physical access and speech deepfake attacks: ASVspoof 2021

RK Das - Proc. 2021 Edition of the Automatic Speaker …, 2021 - isca-archive.org
The rise in demand of voice biometric systems also increases the threat from various kinds
of spoofing attacks from unauthorized users. The latest ASVspoof 2021 challenge devotes to …

Inaudible adversarial perturbations for targeted attack in speaker recognition

Q Wang, P Guo, L Xie - arXiv preprint arXiv:2005.10637, 2020 - arxiv.org
Speaker recognition is a popular topic in biometric authentication and many deep learning
approaches have achieved extraordinary performances. However, it has been shown in …