Picture for Hemlata Tak

Hemlata Tak

t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators

Add code
Sep 21, 2023
Figure 1 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 2 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 3 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 4 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Viaarxiv icon

Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

Add code
Jun 13, 2023
Figure 1 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 2 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 3 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 4 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Viaarxiv icon

Towards single integrated spoofing-aware speaker verification embeddings

Add code
Jun 01, 2023
Figure 1 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 2 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 3 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 4 for Towards single integrated spoofing-aware speaker verification embeddings
Viaarxiv icon

Can spoofing countermeasure and speaker verification systems be jointly optimised?

Add code
Mar 31, 2023
Figure 1 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 2 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 3 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 4 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Viaarxiv icon

Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion

Add code
Apr 21, 2022
Figure 1 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 2 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 3 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 4 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Viaarxiv icon

SASV 2022: The First Spoofing-Aware Speaker Verification Challenge

Add code
Mar 28, 2022
Figure 1 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 2 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 3 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 4 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Viaarxiv icon

Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation

Add code
Feb 28, 2022
Figure 1 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 2 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 3 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 4 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Viaarxiv icon

SASV Challenge 2022: A Spoofing Aware Speaker Verification Challenge Evaluation Plan

Add code
Jan 25, 2022
Figure 1 for SASV Challenge 2022: A Spoofing Aware Speaker Verification Challenge Evaluation Plan
Figure 2 for SASV Challenge 2022: A Spoofing Aware Speaker Verification Challenge Evaluation Plan
Viaarxiv icon

RawBoost: A Raw Data Boosting and Augmentation Method applied to Automatic Speaker Verification Anti-Spoofing

Add code
Nov 08, 2021
Figure 1 for RawBoost: A Raw Data Boosting and Augmentation Method applied to Automatic Speaker Verification Anti-Spoofing
Figure 2 for RawBoost: A Raw Data Boosting and Augmentation Method applied to Automatic Speaker Verification Anti-Spoofing
Figure 3 for RawBoost: A Raw Data Boosting and Augmentation Method applied to Automatic Speaker Verification Anti-Spoofing
Figure 4 for RawBoost: A Raw Data Boosting and Augmentation Method applied to Automatic Speaker Verification Anti-Spoofing
Viaarxiv icon

AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks

Add code
Oct 04, 2021
Figure 1 for AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks
Figure 2 for AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks
Figure 3 for AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks
Figure 4 for AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks
Viaarxiv icon