Picture for Junichi Yamagishi

Junichi Yamagishi

Self Voice Conversion as an Attack against Neural Audio Watermarking

Add code
Jan 28, 2026
Viaarxiv icon

The Third VoicePrivacy Challenge: Preserving Emotional Expressiveness and Linguistic Content in Voice Anonymization

Add code
Jan 17, 2026
Viaarxiv icon

ASVspoof 5: Evaluation of Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech

Add code
Jan 07, 2026
Viaarxiv icon

Human perception of audio deepfakes: the role of language and speaking style

Add code
Dec 10, 2025
Viaarxiv icon

From Sharpness to Better Generalization for Speech Deepfake Detection

Add code
Jun 13, 2025
Viaarxiv icon

Quantifying Source Speaker Leakage in One-to-One Voice Conversion

Add code
Apr 22, 2025
Figure 1 for Quantifying Source Speaker Leakage in One-to-One Voice Conversion
Viaarxiv icon

QualiSpeech: A Speech Quality Assessment Dataset with Natural Language Reasoning and Descriptions

Add code
Mar 26, 2025
Figure 1 for QualiSpeech: A Speech Quality Assessment Dataset with Natural Language Reasoning and Descriptions
Figure 2 for QualiSpeech: A Speech Quality Assessment Dataset with Natural Language Reasoning and Descriptions
Figure 3 for QualiSpeech: A Speech Quality Assessment Dataset with Natural Language Reasoning and Descriptions
Figure 4 for QualiSpeech: A Speech Quality Assessment Dataset with Natural Language Reasoning and Descriptions
Viaarxiv icon

Good practices for evaluation of synthesized speech

Add code
Mar 05, 2025
Viaarxiv icon

Towards Automated Fact-Checking of Real-World Claims: Exploring Task Formulation and Assessment with LLMs

Add code
Feb 13, 2025
Figure 1 for Towards Automated Fact-Checking of Real-World Claims: Exploring Task Formulation and Assessment with LLMs
Figure 2 for Towards Automated Fact-Checking of Real-World Claims: Exploring Task Formulation and Assessment with LLMs
Figure 3 for Towards Automated Fact-Checking of Real-World Claims: Exploring Task Formulation and Assessment with LLMs
Figure 4 for Towards Automated Fact-Checking of Real-World Claims: Exploring Task Formulation and Assessment with LLMs
Viaarxiv icon

ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech

Add code
Feb 13, 2025
Figure 1 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 2 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 3 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 4 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Viaarxiv icon