Adversarial attack and defense strategies of speaker recognition systems: A survey
Speaker recognition is a task that identifies the speaker from multiple audios. Recently,
advances in deep learning have considerably boosted the development of speech signal …
advances in deep learning have considerably boosted the development of speech signal …
Asvspoof 2021: Towards spoofed and deepfake speech detection in the wild
Benchmarking initiatives support the meaningful comparison of competing solutions to
prominent problems in speech and language processing. Successive benchmarking …
prominent problems in speech and language processing. Successive benchmarking …
The defender's perspective on automatic speaker verification: An overview
Automatic speaker verification (ASV) plays a critical role in security-sensitive environments.
Regrettably, the reliability of ASV has been undermined by the emergence of spoofing …
Regrettably, the reliability of ASV has been undermined by the emergence of spoofing …
Study of pre-processing defenses against adversarial attacks on state-of-the-art speaker recognition systems
Adversarial examples are designed to fool the speaker recognition (SR) system by adding a
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems
DNN-based speaker recognition systems (SRSs) in smart cities suffer from adversarial
attacks, which have caused widespread concern. An attacker can fool the SRSs by adding …
attacks, which have caused widespread concern. An attacker can fool the SRSs by adding …
Improving the adversarial robustness for speaker verification by self-supervised learning
Previous works have shown that automatic speaker verification (ASV) is seriously vulnerable
to malicious spoofing attacks, such as replay, synthetic speech, and recently emerged …
to malicious spoofing attacks, such as replay, synthetic speech, and recently emerged …
Voting for the right answer: Adversarial defense for speaker verification
Automatic speaker verification (ASV) is a well developed technology for biometric
identification, and has been ubiquitous implemented in security-critic applications, such as …
identification, and has been ubiquitous implemented in security-critic applications, such as …
ESPnet-SPK: full pipeline speaker embedding toolkit with reproducible recipes, self-supervised front-ends, and off-the-shelf models
This paper introduces ESPnet-SPK, a toolkit designed with several objectives for training
speaker embedding extractors. First, we provide an open-source platform for researchers in …
speaker embedding extractors. First, we provide an open-source platform for researchers in …
Adversarial sample detection for speaker verification by neural vocoders
Automatic speaker verification (ASV), one of the most important technology for biometric
identification, has been widely adopted in security-critical applications. However, ASV is …
identification, has been widely adopted in security-critical applications. However, ASV is …
PhoneyTalker: An out-of-the-box toolkit for adversarial example attack on speaker recognition
Voice has become a fundamental method for human-computer interactions and person
identification these days. Benefit from the rapid development of deep learning, speaker …
identification these days. Benefit from the rapid development of deep learning, speaker …