Picture for Junichi Yamagishi

Junichi Yamagishi

The VoiceMOS Challenge 2022

Add code
Mar 28, 2022
Figure 1 for The VoiceMOS Challenge 2022
Figure 2 for The VoiceMOS Challenge 2022
Figure 3 for The VoiceMOS Challenge 2022
Figure 4 for The VoiceMOS Challenge 2022
Viaarxiv icon

The VoicePrivacy 2022 Challenge Evaluation Plan

Add code
Mar 27, 2022
Figure 1 for The VoicePrivacy 2022 Challenge Evaluation Plan
Figure 2 for The VoicePrivacy 2022 Challenge Evaluation Plan
Figure 3 for The VoicePrivacy 2022 Challenge Evaluation Plan
Figure 4 for The VoicePrivacy 2022 Challenge Evaluation Plan
Viaarxiv icon

Language-Independent Speaker Anonymization Approach using Self-Supervised Pre-Trained Models

Add code
Mar 26, 2022
Figure 1 for Language-Independent Speaker Anonymization Approach using Self-Supervised Pre-Trained Models
Figure 2 for Language-Independent Speaker Anonymization Approach using Self-Supervised Pre-Trained Models
Figure 3 for Language-Independent Speaker Anonymization Approach using Self-Supervised Pre-Trained Models
Figure 4 for Language-Independent Speaker Anonymization Approach using Self-Supervised Pre-Trained Models
Viaarxiv icon

Joint Noise Reduction and Listening Enhancement for Full-End Speech Enhancement

Add code
Mar 22, 2022
Figure 1 for Joint Noise Reduction and Listening Enhancement for Full-End Speech Enhancement
Figure 2 for Joint Noise Reduction and Listening Enhancement for Full-End Speech Enhancement
Figure 3 for Joint Noise Reduction and Listening Enhancement for Full-End Speech Enhancement
Figure 4 for Joint Noise Reduction and Listening Enhancement for Full-End Speech Enhancement
Viaarxiv icon

Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation

Add code
Feb 28, 2022
Figure 1 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 2 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 3 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 4 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Viaarxiv icon

Robust Deepfake On Unrestricted Media: Generation And Detection

Add code
Feb 13, 2022
Viaarxiv icon

Optimizing Tandem Speaker Verification and Anti-Spoofing Systems

Add code
Jan 24, 2022
Figure 1 for Optimizing Tandem Speaker Verification and Anti-Spoofing Systems
Figure 2 for Optimizing Tandem Speaker Verification and Anti-Spoofing Systems
Figure 3 for Optimizing Tandem Speaker Verification and Anti-Spoofing Systems
Figure 4 for Optimizing Tandem Speaker Verification and Anti-Spoofing Systems
Viaarxiv icon

A Practical Guide to Logical Access Voice Presentation Attack Detection

Add code
Jan 10, 2022
Figure 1 for A Practical Guide to Logical Access Voice Presentation Attack Detection
Figure 2 for A Practical Guide to Logical Access Voice Presentation Attack Detection
Figure 3 for A Practical Guide to Logical Access Voice Presentation Attack Detection
Figure 4 for A Practical Guide to Logical Access Voice Presentation Attack Detection
Viaarxiv icon

Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio

Add code
Dec 03, 2021
Figure 1 for Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio
Figure 2 for Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio
Figure 3 for Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio
Figure 4 for Effectiveness of Detection-based and Regression-based Approaches for Estimating Mask-Wearing Ratio
Viaarxiv icon

Investigating self-supervised front ends for speech spoofing countermeasures

Add code
Nov 20, 2021
Figure 1 for Investigating self-supervised front ends for speech spoofing countermeasures
Figure 2 for Investigating self-supervised front ends for speech spoofing countermeasures
Figure 3 for Investigating self-supervised front ends for speech spoofing countermeasures
Figure 4 for Investigating self-supervised front ends for speech spoofing countermeasures
Viaarxiv icon