Picture for Kong Aik Lee

Kong Aik Lee

Nes2Net: A Lightweight Nested Architecture for Foundation Model Driven Speech Anti-spoofing

Add code
Apr 08, 2025
Viaarxiv icon

ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech

Add code
Feb 13, 2025
Figure 1 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 2 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 3 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 4 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Viaarxiv icon

On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection

Add code
Dec 12, 2024
Figure 1 for On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection
Figure 2 for On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection
Figure 3 for On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection
Figure 4 for On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection
Viaarxiv icon

MoMuSE: Momentum Multi-modal Target Speaker Extraction for Real-time Scenarios with Impaired Visual Cues

Add code
Dec 11, 2024
Viaarxiv icon

NTU-NPU System for Voice Privacy 2024 Challenge

Add code
Oct 03, 2024
Figure 1 for NTU-NPU System for Voice Privacy 2024 Challenge
Figure 2 for NTU-NPU System for Voice Privacy 2024 Challenge
Figure 3 for NTU-NPU System for Voice Privacy 2024 Challenge
Figure 4 for NTU-NPU System for Voice Privacy 2024 Challenge
Viaarxiv icon

On the effectiveness of enrollment speech augmentation for Target Speaker Extraction

Add code
Sep 15, 2024
Figure 1 for On the effectiveness of enrollment speech augmentation for Target Speaker Extraction
Figure 2 for On the effectiveness of enrollment speech augmentation for Target Speaker Extraction
Figure 3 for On the effectiveness of enrollment speech augmentation for Target Speaker Extraction
Figure 4 for On the effectiveness of enrollment speech augmentation for Target Speaker Extraction
Viaarxiv icon

Towards Quantifying and Reducing Language Mismatch Effects in Cross-Lingual Speech Anti-Spoofing

Add code
Sep 12, 2024
Figure 1 for Towards Quantifying and Reducing Language Mismatch Effects in Cross-Lingual Speech Anti-Spoofing
Figure 2 for Towards Quantifying and Reducing Language Mismatch Effects in Cross-Lingual Speech Anti-Spoofing
Figure 3 for Towards Quantifying and Reducing Language Mismatch Effects in Cross-Lingual Speech Anti-Spoofing
Figure 4 for Towards Quantifying and Reducing Language Mismatch Effects in Cross-Lingual Speech Anti-Spoofing
Viaarxiv icon

NPU-NTU System for Voice Privacy 2024 Challenge

Add code
Sep 06, 2024
Figure 1 for NPU-NTU System for Voice Privacy 2024 Challenge
Figure 2 for NPU-NTU System for Voice Privacy 2024 Challenge
Viaarxiv icon

Malacopula: adversarial automatic speaker verification attacks using a neural-based generalised Hammerstein model

Add code
Aug 17, 2024
Viaarxiv icon

ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale

Add code
Aug 16, 2024
Figure 1 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 2 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 3 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 4 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Viaarxiv icon