Alert button
Picture for Hector Delgado

Hector Delgado

Alert button

Benchmarking and challenges in security and privacy for voice biometrics

Add code
Bookmark button
Alert button
Sep 01, 2021
Jean-Francois Bonastre, Hector Delgado, Nicholas Evans, Tomi Kinnunen, Kong Aik Lee, Xuechen Liu, Andreas Nautsch, Paul-Gauthier Noe, Jose Patino, Md Sahidullah, Brij Mohan Lal Srivastava, Massimiliano Todisco, Natalia Tomashenko, Emmanuel Vincent, Xin Wang, Junichi Yamagishi

Figure 1 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 2 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 3 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 4 for Benchmarking and challenges in security and privacy for voice biometrics
Viaarxiv icon

I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences

Add code
Bookmark button
Alert button
Apr 16, 2019
Kong Aik Lee, Ville Hautamaki, Tomi Kinnunen, Hitoshi Yamamoto, Koji Okabe, Ville Vestman, Jing Huang, Guohong Ding, Hanwu Sun, Anthony Larcher, Rohan Kumar Das, Haizhou Li, Mickael Rouvier, Pierre-Michel Bousquet, Wei Rao, Qing Wang, Chunlei Zhang, Fahimeh Bahmaninezhad, Hector Delgado, Jose Patino, Qiongqiong Wang, Ling Guo, Takafumi Koshinaka, Jiacen Zhang, Koichi Shinoda, Trung Ngo Trong, Md Sahidullah, Fan Lu, Yun Tang, Ming Tu, Kah Kuan Teh, Huy Dat Tran, Kuruvachan K. George, Ivan Kukanov, Florent Desnous, Jichen Yang, Emre Yilmaz, Longting Xu, Jean-Francois Bonastre, Chenglin Xu, Zhi Hao Lim, Eng Siong Chng, Shivesh Ranjan, John H. L. Hansen, Massimiliano Todisco, Nicholas Evans

Figure 1 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 2 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 3 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 4 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Viaarxiv icon

Introduction to Voice Presentation Attack Detection and Recent Advances

Add code
Bookmark button
Alert button
Jan 04, 2019
Md Sahidullah, Hector Delgado, Massimiliano Todisco, Tomi Kinnunen, Nicholas Evans, Junichi Yamagishi, Kong-Aik Lee

Figure 1 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 2 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 3 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 4 for Introduction to Voice Presentation Attack Detection and Recent Advances
Viaarxiv icon

t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

Add code
Bookmark button
Alert button
Apr 25, 2018
Tomi Kinnunen, Kong Aik Lee, Hector Delgado, Nicholas Evans, Massimiliano Todisco, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds

Figure 1 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 2 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 3 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 4 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Viaarxiv icon