Alert button
Picture for Massimiliano Todisco

Massimiliano Todisco

Alert button

Speaker anonymization using neural audio codec language models

Sep 28, 2023
Michele Panariello, Francesco Nespoli, Massimiliano Todisco, Nicholas Evans

Viaarxiv icon

Spoofing attack augmentation: can differently-trained attack models improve generalisation?

Sep 18, 2023
Wanying Ge, Xin Wang, Junichi Yamagishi, Massimiliano Todisco, Nicholas Evans

Viaarxiv icon

SynVox2: Towards a privacy-friendly VoxCeleb2 dataset

Sep 12, 2023
Xiaoxiao Miao, Xin Wang, Erica Cooper, Junichi Yamagishi, Nicholas Evans, Massimiliano Todisco, Jean-François Bonastre, Mickael Rouvier

Figure 1 for SynVox2: Towards a privacy-friendly VoxCeleb2 dataset
Figure 2 for SynVox2: Towards a privacy-friendly VoxCeleb2 dataset
Figure 3 for SynVox2: Towards a privacy-friendly VoxCeleb2 dataset
Figure 4 for SynVox2: Towards a privacy-friendly VoxCeleb2 dataset
Viaarxiv icon

Fairness and Privacy in Voice Biometrics:A Study of Gender Influences Using wav2vec 2.0

Aug 27, 2023
Oubaida Chouchane, Michele Panariello, Chiara Galdi, Massimiliano Todisco, Nicholas Evans

Viaarxiv icon

Vocoder drift compensation by x-vector alignment in speaker anonymisation

Jul 17, 2023
Michele Panariello, Massimiliano Todisco, Nicholas Evans

Figure 1 for Vocoder drift compensation by x-vector alignment in speaker anonymisation
Figure 2 for Vocoder drift compensation by x-vector alignment in speaker anonymisation
Figure 3 for Vocoder drift compensation by x-vector alignment in speaker anonymisation
Figure 4 for Vocoder drift compensation by x-vector alignment in speaker anonymisation
Viaarxiv icon

Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics

Jul 05, 2023
Oubaïda Chouchane, Michele Panariello, Oualid Zari, Ismet Kerenciler, Imen Chihaoui, Massimiliano Todisco, Melek Önen

Figure 1 for Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics
Figure 2 for Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics
Figure 3 for Differentially Private Adversarial Auto-Encoder to Protect Gender in Voice Biometrics
Viaarxiv icon

Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

Jun 13, 2023
Michele Panariello, Wanying Ge, Hemlata Tak, Massimiliano Todisco, Nicholas Evans

Figure 1 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 2 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 3 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 4 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Viaarxiv icon

Vocoder drift in x-vector-based speaker anonymization

Jun 05, 2023
Michele Panariello, Massimiliano Todisco, Nicholas Evans

Figure 1 for Vocoder drift in x-vector-based speaker anonymization
Figure 2 for Vocoder drift in x-vector-based speaker anonymization
Figure 3 for Vocoder drift in x-vector-based speaker anonymization
Viaarxiv icon

Towards single integrated spoofing-aware speaker verification embeddings

Jun 01, 2023
Sung Hwan Mun, Hye-jin Shim, Hemlata Tak, Xin Wang, Xuechen Liu, Md Sahidullah, Myeonghun Jeong, Min Hyun Han, Massimiliano Todisco, Kong Aik Lee, Junichi Yamagishi, Nicholas Evans, Tomi Kinnunen, Nam Soo Kim, Jee-weon Jung

Figure 1 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 2 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 3 for Towards single integrated spoofing-aware speaker verification embeddings
Figure 4 for Towards single integrated spoofing-aware speaker verification embeddings
Viaarxiv icon

Can spoofing countermeasure and speaker verification systems be jointly optimised?

Mar 31, 2023
Wanying Ge, Hemlata Tak, Massimiliano Todisco, Nicholas Evans

Figure 1 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 2 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 3 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 4 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Viaarxiv icon