Picture for Hemlata Tak

Hemlata Tak

Open-Set Source Tracing of Audio Deepfake Systems

Add code
Jul 09, 2025
Viaarxiv icon

ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech

Add code
Feb 13, 2025
Viaarxiv icon

ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale

Add code
Aug 16, 2024
Figure 1 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 2 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 3 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 4 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Viaarxiv icon

Source Tracing of Audio Deepfake Systems

Add code
Jul 10, 2024
Viaarxiv icon

To what extent can ASV systems naturally defend against spoofing attacks?

Add code
Jun 08, 2024
Viaarxiv icon

Harder or Different? Understanding Generalization of Audio Deepfake Detection

Add code
Jun 07, 2024
Viaarxiv icon

t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators

Add code
Sep 21, 2023
Figure 1 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 2 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 3 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Figure 4 for t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators
Viaarxiv icon

Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

Add code
Jun 13, 2023
Viaarxiv icon

Towards single integrated spoofing-aware speaker verification embeddings

Add code
Jun 01, 2023
Viaarxiv icon

Can spoofing countermeasure and speaker verification systems be jointly optimised?

Add code
Mar 31, 2023
Viaarxiv icon