Picture for Hemlata Tak

Hemlata Tak

Source Tracing of Audio Deepfake Systems

Add code
Jul 10, 2024
Figure 1 for Source Tracing of Audio Deepfake Systems
Figure 2 for Source Tracing of Audio Deepfake Systems
Figure 3 for Source Tracing of Audio Deepfake Systems
Figure 4 for Source Tracing of Audio Deepfake Systems
Viaarxiv icon

To what extent can ASV systems naturally defend against spoofing attacks?

Add code
Jun 08, 2024
Figure 1 for To what extent can ASV systems naturally defend against spoofing attacks?
Figure 2 for To what extent can ASV systems naturally defend against spoofing attacks?
Figure 3 for To what extent can ASV systems naturally defend against spoofing attacks?
Figure 4 for To what extent can ASV systems naturally defend against spoofing attacks?
Viaarxiv icon

Harder or Different? Understanding Generalization of Audio Deepfake Detection

Add code
Jun 07, 2024
Viaarxiv icon

t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators

Add code
Sep 21, 2023
Figure 1 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 2 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 3 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 4 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Viaarxiv icon

Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

Add code
Jun 13, 2023
Figure 1 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 2 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 3 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 4 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Viaarxiv icon

Towards single integrated spoofing-aware speaker verification embeddings

Add code
Jun 01, 2023
Figure 1 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 2 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 3 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 4 for Towards single integrated spoofing-aware speaker verification embeddings
Viaarxiv icon

Can spoofing countermeasure and speaker verification systems be jointly optimised?

Add code
Mar 31, 2023
Figure 1 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 2 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 3 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 4 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Viaarxiv icon

Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion

Add code
Apr 21, 2022
Figure 1 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 2 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 3 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 4 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Viaarxiv icon

SASV 2022: The First Spoofing-Aware Speaker Verification Challenge

Add code
Mar 28, 2022
Figure 1 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 2 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 3 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 4 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Viaarxiv icon

Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation

Add code
Feb 28, 2022
Figure 1 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 2 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 3 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 4 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Viaarxiv icon