Alert button
Picture for Junichi Yamagishi

Junichi Yamagishi

Alert button

Detecting and Correcting Adversarial Images Using Image Processing Operations

Add code
Bookmark button
Alert button
Dec 30, 2019
Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen

Figure 1 for Detecting and Correcting Adversarial Images Using Image Processing Operations
Figure 2 for Detecting and Correcting Adversarial Images Using Image Processing Operations
Figure 3 for Detecting and Correcting Adversarial Images Using Image Processing Operations
Figure 4 for Detecting and Correcting Adversarial Images Using Image Processing Operations
Viaarxiv icon

Detecting and Correcting Adversarial Images Using Image Processing Operations and Convolutional Neural Networks

Add code
Bookmark button
Alert button
Dec 11, 2019
Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen

Figure 1 for Detecting and Correcting Adversarial Images Using Image Processing Operations and Convolutional Neural Networks
Figure 2 for Detecting and Correcting Adversarial Images Using Image Processing Operations and Convolutional Neural Networks
Figure 3 for Detecting and Correcting Adversarial Images Using Image Processing Operations and Convolutional Neural Networks
Figure 4 for Detecting and Correcting Adversarial Images Using Image Processing Operations and Convolutional Neural Networks
Viaarxiv icon

Transferring neural speech waveform synthesizers to musical instrument sounds generation

Add code
Bookmark button
Alert button
Nov 19, 2019
Yi Zhao, Xin Wang, Lauri Juvela, Junichi Yamagishi

Figure 1 for Transferring neural speech waveform synthesizers to musical instrument sounds generation
Figure 2 for Transferring neural speech waveform synthesizers to musical instrument sounds generation
Figure 3 for Transferring neural speech waveform synthesizers to musical instrument sounds generation
Figure 4 for Transferring neural speech waveform synthesizers to musical instrument sounds generation
Viaarxiv icon

Security of Facial Forensics Models Against Adversarial Attacks

Add code
Bookmark button
Alert button
Nov 02, 2019
Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen

Figure 1 for Security of Facial Forensics Models Against Adversarial Attacks
Figure 2 for Security of Facial Forensics Models Against Adversarial Attacks
Figure 3 for Security of Facial Forensics Models Against Adversarial Attacks
Figure 4 for Security of Facial Forensics Models Against Adversarial Attacks
Viaarxiv icon

A Method for Identifying Origin of Digital Images Using a Convolution Neural Network

Add code
Bookmark button
Alert button
Nov 02, 2019
Rong Huang, Fuming Fang, Huy H. Nguyen, Junichi Yamagishi, Isao Echizen

Figure 1 for A Method for Identifying Origin of Digital Images Using a Convolution Neural Network
Figure 2 for A Method for Identifying Origin of Digital Images Using a Convolution Neural Network
Figure 3 for A Method for Identifying Origin of Digital Images Using a Convolution Neural Network
Figure 4 for A Method for Identifying Origin of Digital Images Using a Convolution Neural Network
Viaarxiv icon

Use of a Capsule Network to Detect Fake Images and Videos

Add code
Bookmark button
Alert button
Oct 29, 2019
Huy H. Nguyen, Junichi Yamagishi, Isao Echizen

Figure 1 for Use of a Capsule Network to Detect Fake Images and Videos
Figure 2 for Use of a Capsule Network to Detect Fake Images and Videos
Figure 3 for Use of a Capsule Network to Detect Fake Images and Videos
Figure 4 for Use of a Capsule Network to Detect Fake Images and Videos
Viaarxiv icon

Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment

Add code
Bookmark button
Alert button
Oct 28, 2019
Yusuke Yasuda, Xin Wang, Junichi Yamagishi

Figure 1 for Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment
Figure 2 for Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment
Figure 3 for Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment
Figure 4 for Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment
Viaarxiv icon

Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech

Add code
Bookmark button
Alert button
Sep 14, 2019
Hieu-Thi Luong, Junichi Yamagishi

Figure 1 for Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech
Figure 2 for Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech
Figure 3 for Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech
Figure 4 for Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech
Viaarxiv icon

Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments

Add code
Bookmark button
Alert button
Aug 30, 2019
Yusuke Yasuda, Xin Wang, Junichi Yamagishi

Figure 1 for Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments
Figure 2 for Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments
Figure 3 for Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments
Figure 4 for Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments
Viaarxiv icon