Alert button
Picture for Hee-Soo Heo

Hee-Soo Heo

Alert button

Disentangled dimensionality reduction for noise-robust speaker diarisation

Oct 07, 2021
You Jin Kim, Hee-Soo Heo, Jee-weon Jung, Youngki Kwon, Bong-Jin Lee, Joon Son Chung

Figure 1 for Disentangled dimensionality reduction for noise-robust speaker diarisation
Figure 2 for Disentangled dimensionality reduction for noise-robust speaker diarisation
Figure 3 for Disentangled dimensionality reduction for noise-robust speaker diarisation
Figure 4 for Disentangled dimensionality reduction for noise-robust speaker diarisation
Viaarxiv icon

Multi-scale speaker embedding-based graph attention networks for speaker diarisation

Oct 07, 2021
Youngki Kwon, Hee-Soo Heo, Jee-weon Jung, You Jin Kim, Bong-Jin Lee, Joon Son Chung

Figure 1 for Multi-scale speaker embedding-based graph attention networks for speaker diarisation
Figure 2 for Multi-scale speaker embedding-based graph attention networks for speaker diarisation
Figure 3 for Multi-scale speaker embedding-based graph attention networks for speaker diarisation
Viaarxiv icon

AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks

Oct 04, 2021
Jee-weon Jung, Hee-Soo Heo, Hemlata Tak, Hye-jin Shim, Joon Son Chung, Bong-Jin Lee, Ha-Jin Yu, Nicholas Evans

Figure 1 for AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks
Figure 2 for AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks
Figure 3 for AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks
Figure 4 for AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks
Viaarxiv icon

Look Who's Talking: Active Speaker Detection in the Wild

Aug 17, 2021
You Jin Kim, Hee-Soo Heo, Soyeon Choe, Soo-Whan Chung, Yoohwan Kwon, Bong-Jin Lee, Youngki Kwon, Joon Son Chung

Figure 1 for Look Who's Talking: Active Speaker Detection in the Wild
Figure 2 for Look Who's Talking: Active Speaker Detection in the Wild
Figure 3 for Look Who's Talking: Active Speaker Detection in the Wild
Figure 4 for Look Who's Talking: Active Speaker Detection in the Wild
Viaarxiv icon

Adapting Speaker Embeddings for Speaker Diarisation

Apr 07, 2021
Youngki Kwon, Jee-weon Jung, Hee-Soo Heo, You Jin Kim, Bong-Jin Lee, Joon Son Chung

Figure 1 for Adapting Speaker Embeddings for Speaker Diarisation
Figure 2 for Adapting Speaker Embeddings for Speaker Diarisation
Figure 3 for Adapting Speaker Embeddings for Speaker Diarisation
Figure 4 for Adapting Speaker Embeddings for Speaker Diarisation
Viaarxiv icon

Three-class Overlapped Speech Detection using a Convolutional Recurrent Neural Network

Apr 07, 2021
Jee-weon Jung, Hee-Soo Heo, Youngki Kwon, Joon Son Chung, Bong-Jin Lee

Figure 1 for Three-class Overlapped Speech Detection using a Convolutional Recurrent Neural Network
Figure 2 for Three-class Overlapped Speech Detection using a Convolutional Recurrent Neural Network
Figure 3 for Three-class Overlapped Speech Detection using a Convolutional Recurrent Neural Network
Figure 4 for Three-class Overlapped Speech Detection using a Convolutional Recurrent Neural Network
Viaarxiv icon

Graph Attention Networks for Speaker Verification

Oct 22, 2020
Jee-weon Jung, Hee-Soo Heo, Ha-Jin Yu, Joon Son Chung

Figure 1 for Graph Attention Networks for Speaker Verification
Figure 2 for Graph Attention Networks for Speaker Verification
Figure 3 for Graph Attention Networks for Speaker Verification
Viaarxiv icon

A study on the role of subsidiary information in replay attack spoofing detection

Jan 31, 2020
Jee-weon Jung, Hye-jin Shim, Hee-Soo Heo, Ha-Jin Yu

Figure 1 for A study on the role of subsidiary information in replay attack spoofing detection
Figure 2 for A study on the role of subsidiary information in replay attack spoofing detection
Figure 3 for A study on the role of subsidiary information in replay attack spoofing detection
Figure 4 for A study on the role of subsidiary information in replay attack spoofing detection
Viaarxiv icon

Self-supervised pre-training with acoustic configurations for replay spoofing detection

Oct 22, 2019
Hye-jin Shim, Hee-Soo Heo, Jee-weon Jung, Ha-Jin Yu

Figure 1 for Self-supervised pre-training with acoustic configurations for replay spoofing detection
Figure 2 for Self-supervised pre-training with acoustic configurations for replay spoofing detection
Figure 3 for Self-supervised pre-training with acoustic configurations for replay spoofing detection
Figure 4 for Self-supervised pre-training with acoustic configurations for replay spoofing detection
Viaarxiv icon

Cosine similarity-based adversarial process

Jul 01, 2019
Hee-Soo Heo, Jee-weon Jung, Hye-jin Shim, IL-Ho Yang, Ha-Jin Yu

Figure 1 for Cosine similarity-based adversarial process
Figure 2 for Cosine similarity-based adversarial process
Figure 3 for Cosine similarity-based adversarial process
Figure 4 for Cosine similarity-based adversarial process
Viaarxiv icon