Picture for Junichi Yamagishi

Junichi Yamagishi

An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning

Add code
Feb 06, 2020
Figure 1 for An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning
Figure 2 for An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning
Figure 3 for An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning
Figure 4 for An initial investigation on optimizing tandem speaker verification and countermeasure systems using reinforcement learning
Viaarxiv icon

Detecting and Correcting Adversarial Images Using Image Processing Operations

Add code
Dec 30, 2019
Figure 1 for Detecting and Correcting Adversarial Images Using Image Processing Operations
Figure 2 for Detecting and Correcting Adversarial Images Using Image Processing Operations
Figure 3 for Detecting and Correcting Adversarial Images Using Image Processing Operations
Figure 4 for Detecting and Correcting Adversarial Images Using Image Processing Operations
Viaarxiv icon

Transferring neural speech waveform synthesizers to musical instrument sounds generation

Add code
Nov 19, 2019
Figure 1 for Transferring neural speech waveform synthesizers to musical instrument sounds generation
Figure 2 for Transferring neural speech waveform synthesizers to musical instrument sounds generation
Figure 3 for Transferring neural speech waveform synthesizers to musical instrument sounds generation
Figure 4 for Transferring neural speech waveform synthesizers to musical instrument sounds generation
Viaarxiv icon

Security of Facial Forensics Models Against Adversarial Attacks

Add code
Nov 02, 2019
Figure 1 for Security of Facial Forensics Models Against Adversarial Attacks
Figure 2 for Security of Facial Forensics Models Against Adversarial Attacks
Figure 3 for Security of Facial Forensics Models Against Adversarial Attacks
Figure 4 for Security of Facial Forensics Models Against Adversarial Attacks
Viaarxiv icon

A Method for Identifying Origin of Digital Images Using a Convolution Neural Network

Add code
Nov 02, 2019
Figure 1 for A Method for Identifying Origin of Digital Images Using a Convolution Neural Network
Figure 2 for A Method for Identifying Origin of Digital Images Using a Convolution Neural Network
Figure 3 for A Method for Identifying Origin of Digital Images Using a Convolution Neural Network
Figure 4 for A Method for Identifying Origin of Digital Images Using a Convolution Neural Network
Viaarxiv icon

Use of a Capsule Network to Detect Fake Images and Videos

Add code
Oct 29, 2019
Figure 1 for Use of a Capsule Network to Detect Fake Images and Videos
Figure 2 for Use of a Capsule Network to Detect Fake Images and Videos
Figure 3 for Use of a Capsule Network to Detect Fake Images and Videos
Figure 4 for Use of a Capsule Network to Detect Fake Images and Videos
Viaarxiv icon

Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment

Add code
Oct 28, 2019
Figure 1 for Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment
Figure 2 for Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment
Figure 3 for Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment
Figure 4 for Effect of choice of probability distribution, randomness, and search methods for alignment modeling in sequence-to-sequence text-to-speech synthesis using hard alignment
Viaarxiv icon

Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech

Add code
Sep 14, 2019
Figure 1 for Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech
Figure 2 for Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech
Figure 3 for Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech
Figure 4 for Bootstrapping non-parallel voice conversion from speaker-adaptive text-to-speech
Viaarxiv icon

Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments

Add code
Aug 30, 2019
Figure 1 for Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments
Figure 2 for Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments
Figure 3 for Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments
Figure 4 for Initial investigation of an encoder-decoder end-to-end TTS framework using marginalization of monotonic hard latent alignments
Viaarxiv icon

Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection

Add code
Jul 22, 2019
Figure 1 for Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection
Figure 2 for Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection
Figure 3 for Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection
Figure 4 for Generating Sentiment-Preserving Fake Online Reviews Using Neural Language Models and Their Human- and Machine-based Detection
Viaarxiv icon