Picture for Brij Mohan Lal Srivastava

Brij Mohan Lal Srivastava

Learnings from Technological Interventions in a Low Resource Language: Enhancing Information Access in Gondi

Add code
Nov 29, 2022
Figure 1 for Learnings from Technological Interventions in a Low Resource Language: Enhancing Information Access in Gondi
Figure 2 for Learnings from Technological Interventions in a Low Resource Language: Enhancing Information Access in Gondi
Figure 3 for Learnings from Technological Interventions in a Low Resource Language: Enhancing Information Access in Gondi
Figure 4 for Learnings from Technological Interventions in a Low Resource Language: Enhancing Information Access in Gondi
Viaarxiv icon

The VoicePrivacy 2020 Challenge Evaluation Plan

Add code
May 14, 2022
Figure 1 for The VoicePrivacy 2020 Challenge Evaluation Plan
Figure 2 for The VoicePrivacy 2020 Challenge Evaluation Plan
Figure 3 for The VoicePrivacy 2020 Challenge Evaluation Plan
Figure 4 for The VoicePrivacy 2020 Challenge Evaluation Plan
Viaarxiv icon

Differentially Private Speaker Anonymization

Add code
Feb 23, 2022
Figure 1 for Differentially Private Speaker Anonymization
Figure 2 for Differentially Private Speaker Anonymization
Figure 3 for Differentially Private Speaker Anonymization
Figure 4 for Differentially Private Speaker Anonymization
Viaarxiv icon

The VoicePrivacy 2020 Challenge: Results and findings

Add code
Sep 01, 2021
Figure 1 for The VoicePrivacy 2020 Challenge: Results and findings
Figure 2 for The VoicePrivacy 2020 Challenge: Results and findings
Figure 3 for The VoicePrivacy 2020 Challenge: Results and findings
Figure 4 for The VoicePrivacy 2020 Challenge: Results and findings
Viaarxiv icon

Benchmarking and challenges in security and privacy for voice biometrics

Add code
Sep 01, 2021
Figure 1 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 2 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 3 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 4 for Benchmarking and challenges in security and privacy for voice biometrics
Viaarxiv icon

Design Choices for X-vector Based Speaker Anonymization

Add code
May 18, 2020
Figure 1 for Design Choices for X-vector Based Speaker Anonymization
Figure 2 for Design Choices for X-vector Based Speaker Anonymization
Figure 3 for Design Choices for X-vector Based Speaker Anonymization
Figure 4 for Design Choices for X-vector Based Speaker Anonymization
Viaarxiv icon

Introducing the VoicePrivacy Initiative

Add code
May 13, 2020
Figure 1 for Introducing the VoicePrivacy Initiative
Figure 2 for Introducing the VoicePrivacy Initiative
Figure 3 for Introducing the VoicePrivacy Initiative
Figure 4 for Introducing the VoicePrivacy Initiative
Viaarxiv icon

Learnings from Technological Interventions in a Low Resource Language: A Case-Study on Gondi

Add code
Apr 21, 2020
Figure 1 for Learnings from Technological Interventions in a Low Resource Language: A Case-Study on Gondi
Figure 2 for Learnings from Technological Interventions in a Low Resource Language: A Case-Study on Gondi
Figure 3 for Learnings from Technological Interventions in a Low Resource Language: A Case-Study on Gondi
Figure 4 for Learnings from Technological Interventions in a Low Resource Language: A Case-Study on Gondi
Viaarxiv icon

Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion?

Add code
Nov 12, 2019
Figure 1 for Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion?
Figure 2 for Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion?
Figure 3 for Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion?
Figure 4 for Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion?
Viaarxiv icon

Evaluating Voice Conversion-based Privacy Protection against Informed Attackers

Add code
Nov 10, 2019
Figure 1 for Evaluating Voice Conversion-based Privacy Protection against Informed Attackers
Figure 2 for Evaluating Voice Conversion-based Privacy Protection against Informed Attackers
Viaarxiv icon