Safeear: Content privacy-preserving audio deepfake detection
Text-to-Speech (TTS) and Voice Conversion (VC) models have exhibited remarkable
performance in generating realistic and natural audio. However, their dark side, audio …
performance in generating realistic and natural audio. However, their dark side, audio …
Twice attention networks for synthetic speech detection
C Chen, Y Song, B Dai, D Chen - Neurocomputing, 2023 - Elsevier
Automatic speaker verification (ASV) systems are highly vulnerable to synthetic speech
attack. And the artifacts are the key spoofing clue to distinguish real and synthetic speech. In …
attack. And the artifacts are the key spoofing clue to distinguish real and synthetic speech. In …
Few-shot pump anomaly detection via Diff-WRN-based model-agnostic meta-learning strategy
F Zou, S Sang, M Jiang, X Li… - Structural Health …, 2023 - journals.sagepub.com
As a critical component in agriculture, industry, and the military, pump anomaly detection
has recently aroused wide attention, which requires deep and abundant development and …
has recently aroused wide attention, which requires deep and abundant development and …
基于上下文信息与注意力特征的欺骗语音检测
陈佳, 章坚武, 张浙亮 - 电信科学, 2023 - infocomm-journal.com
随着语音合成和语音转换技术的快速发展, 欺骗语音检测方法仍存在欺骗检测准确率低,
通用性差等问题. 因此, 提出一种基于上下文信息与注意力特征的端到端的欺骗检测方法 …
通用性差等问题. 因此, 提出一种基于上下文信息与注意力特征的端到端的欺骗检测方法 …
A comparison of CQT spectrogram with STFT-based acoustic features in Deep Learning-based synthetic speech detection
P Abdzadeh, H Veisi - Journal of AI and Data Mining, 2023 - jad.shahroodut.ac.ir
Automatic Speaker Verification (ASV) systems have proven to bevulnerable to various types
of presentation attacks, among whichLogical Access attacks are manufactured using …
of presentation attacks, among whichLogical Access attacks are manufactured using …
[PDF][PDF] An Application-Oriented Taxonomy on Spoofing, Disguise and Countermeasures in Speaker Recognition
Speaker recognition aims to recognize the identity of the speaking person. After decades of
research, current speaker recognition systems have achieved rather satisfactory …
research, current speaker recognition systems have achieved rather satisfactory …
Generalizable Speech Spoofing Detection Against Silence Trimming with Data Augmentation and Multi-task Meta-Learning
A major difficulty in speech spoofing detection lies in improving the generalization ability to
detect unknown forgery methods. However, most previous methods do not consider the …
detect unknown forgery methods. However, most previous methods do not consider the …
[PDF][PDF] Mixup regularization strategies for spoofing countermeasure system.
The main objective of the spoof detection system for speaker verification applications is to
capture the artifacts from the given speech sample. Therefore, it is important to ensure that …
capture the artifacts from the given speech sample. Therefore, it is important to ensure that …
[PDF][PDF] Investigation on Mixup Strategies for End-to-End Voice Spoof Detection System.
For building a reliable spoof detection system for speaker verification applications, it is
important to ensure that the system generalizes well to spoof attack types unobserved during …
important to ensure that the system generalizes well to spoof attack types unobserved during …