Safeear: Content privacy-preserving audio deepfake detection

X Li, K Li, Y Zheng, C Yan, X Ji, W Xu - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Text-to-Speech (TTS) and Voice Conversion (VC) models have exhibited remarkable
performance in generating realistic and natural audio. However, their dark side, audio …

Twice attention networks for synthetic speech detection

C Chen, Y Song, B Dai, D Chen - Neurocomputing, 2023 - Elsevier
Automatic speaker verification (ASV) systems are highly vulnerable to synthetic speech
attack. And the artifacts are the key spoofing clue to distinguish real and synthetic speech. In …

Few-shot pump anomaly detection via Diff-WRN-based model-agnostic meta-learning strategy

F Zou, S Sang, M Jiang, X Li… - Structural Health …, 2023 - journals.sagepub.com
As a critical component in agriculture, industry, and the military, pump anomaly detection
has recently aroused wide attention, which requires deep and abundant development and …

基于上下文信息与注意力特征的欺骗语音检测

陈佳, 章坚武, 张浙亮 - 电信科学, 2023 - infocomm-journal.com
随着语音合成和语音转换技术的快速发展, 欺骗语音检测方法仍存在欺骗检测准确率低,
通用性差等问题. 因此, 提出一种基于上下文信息与注意力特征的端到端的欺骗检测方法 …

A comparison of CQT spectrogram with STFT-based acoustic features in Deep Learning-based synthetic speech detection

P Abdzadeh, H Veisi - Journal of AI and Data Mining, 2023 - jad.shahroodut.ac.ir
Automatic Speaker Verification (ASV) systems have proven to bevulnerable to various types
of presentation attacks, among whichLogical Access attacks are manufactured using …

[PDF][PDF] An Application-Oriented Taxonomy on Spoofing, Disguise and Countermeasures in Speaker Recognition

L Li, X Cheng, TF Zheng - APSIPA Transactions on Signal …, 2022 - nowpublishers.com
Speaker recognition aims to recognize the identity of the speaking person. After decades of
research, current speaker recognition systems have achieved rather satisfactory …

Generalizable Speech Spoofing Detection Against Silence Trimming with Data Augmentation and Multi-task Meta-Learning

L Wang, L Yu, Y Zhang, H Xie - IEEE/ACM Transactions on …, 2024 - ieeexplore.ieee.org
A major difficulty in speech spoofing detection lies in improving the generalization ability to
detect unknown forgery methods. However, most previous methods do not consider the …

[PDF][PDF] Mixup regularization strategies for spoofing countermeasure system.

WH Kang, J Alam, A Fathan - INTERSPEECH, 2022 - isca-archive.org
The main objective of the spoof detection system for speaker verification applications is to
capture the artifacts from the given speech sample. Therefore, it is important to ensure that …

[PDF][PDF] Investigation on Mixup Strategies for End-to-End Voice Spoof Detection System.

WH Kang, J Alam, A Fathan - Odyssey, 2022 - isca-archive.org
For building a reliable spoof detection system for speaker verification applications, it is
important to ensure that the system generalizes well to spoof attack types unobserved during …