Picture for Junichi Yamagishi

Junichi Yamagishi

End-to-End Text-to-Speech using Latent Duration based on VQ-VAE

Add code
Oct 20, 2020
Figure 1 for End-to-End Text-to-Speech using Latent Duration based on VQ-VAE
Figure 2 for End-to-End Text-to-Speech using Latent Duration based on VQ-VAE
Figure 3 for End-to-End Text-to-Speech using Latent Duration based on VQ-VAE
Figure 4 for End-to-End Text-to-Speech using Latent Duration based on VQ-VAE
Viaarxiv icon

Latent linguistic embedding for cross-lingual text-to-speech and voice conversion

Add code
Oct 08, 2020
Figure 1 for Latent linguistic embedding for cross-lingual text-to-speech and voice conversion
Figure 2 for Latent linguistic embedding for cross-lingual text-to-speech and voice conversion
Figure 3 for Latent linguistic embedding for cross-lingual text-to-speech and voice conversion
Figure 4 for Latent linguistic embedding for cross-lingual text-to-speech and voice conversion
Viaarxiv icon

Viable Threat on News Reading: Generating Biased News Using Natural Language Models

Add code
Oct 05, 2020
Figure 1 for Viable Threat on News Reading: Generating Biased News Using Natural Language Models
Figure 2 for Viable Threat on News Reading: Generating Biased News Using Natural Language Models
Figure 3 for Viable Threat on News Reading: Generating Biased News Using Natural Language Models
Figure 4 for Viable Threat on News Reading: Generating Biased News Using Natural Language Models
Viaarxiv icon

Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals

Add code
Jul 12, 2020
Figure 1 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 2 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 3 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 4 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Viaarxiv icon

Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems

Add code
Jun 15, 2020
Figure 1 for Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems
Figure 2 for Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems
Figure 3 for Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems
Figure 4 for Generating Master Faces for Use in Performing Wolf Attacks on Face Recognition Systems
Viaarxiv icon

NAUTILUS: a Versatile Voice Cloning System

Add code
May 22, 2020
Figure 1 for NAUTILUS: a Versatile Voice Cloning System
Figure 2 for NAUTILUS: a Versatile Voice Cloning System
Figure 3 for NAUTILUS: a Versatile Voice Cloning System
Figure 4 for NAUTILUS: a Versatile Voice Cloning System
Viaarxiv icon

Investigation of learning abilities on linguistic features in sequence-to-sequence text-to-speech synthesis

Add code
May 20, 2020
Figure 1 for Investigation of learning abilities on linguistic features in sequence-to-sequence text-to-speech synthesis
Figure 2 for Investigation of learning abilities on linguistic features in sequence-to-sequence text-to-speech synthesis
Figure 3 for Investigation of learning abilities on linguistic features in sequence-to-sequence text-to-speech synthesis
Figure 4 for Investigation of learning abilities on linguistic features in sequence-to-sequence text-to-speech synthesis
Viaarxiv icon

Design Choices for X-vector Based Speaker Anonymization

Add code
May 18, 2020
Figure 1 for Design Choices for X-vector Based Speaker Anonymization
Figure 2 for Design Choices for X-vector Based Speaker Anonymization
Figure 3 for Design Choices for X-vector Based Speaker Anonymization
Figure 4 for Design Choices for X-vector Based Speaker Anonymization
Viaarxiv icon

Introducing the VoicePrivacy Initiative

Add code
May 13, 2020
Figure 1 for Introducing the VoicePrivacy Initiative
Figure 2 for Introducing the VoicePrivacy Initiative
Figure 3 for Introducing the VoicePrivacy Initiative
Figure 4 for Introducing the VoicePrivacy Initiative
Viaarxiv icon

An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning

Add code
Feb 06, 2020
Figure 1 for An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning
Figure 2 for An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning
Figure 3 for An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning
Figure 4 for An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning
Viaarxiv icon