Picture for Md Sahidullah

Md Sahidullah

MULTISPEECH

Cyclostationarity Analysis as a Complement to Self-Supervised Representations for Speech Deepfake Detection

Add code
Mar 04, 2026
Viaarxiv icon

TCG CREST System Description for the DISPLACE-M Challenge

Add code
Mar 03, 2026
Viaarxiv icon

MK-SGC-SC: Multiple Kernel Guided Sparse Graph Construction in Spectral Clustering for Unsupervised Speaker Diarization

Add code
Jan 29, 2026
Viaarxiv icon

Shortcut Learning in Binary Classifier Black Boxes: Applications to Voice Anti-Spoofing and Biometrics

Add code
Jan 25, 2026
Viaarxiv icon

ASVspoof 5: Evaluation of Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech

Add code
Jan 07, 2026
Viaarxiv icon

ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech

Add code
Feb 13, 2025
Figure 1 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 2 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 3 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Figure 4 for ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
Viaarxiv icon

IITKGP-ABSP Submission to LRE22: Language Recognition in Low-Resource Settings

Add code
Jan 15, 2025
Viaarxiv icon

Explaining Speaker and Spoof Embeddings via Probing

Add code
Dec 24, 2024
Figure 1 for Explaining Speaker and Spoof Embeddings via Probing
Figure 2 for Explaining Speaker and Spoof Embeddings via Probing
Figure 3 for Explaining Speaker and Spoof Embeddings via Probing
Figure 4 for Explaining Speaker and Spoof Embeddings via Probing
Viaarxiv icon

ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale

Add code
Aug 16, 2024
Figure 1 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 2 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 3 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 4 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Viaarxiv icon

Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing

Add code
Jun 25, 2024
Figure 1 for Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing
Figure 2 for Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing
Figure 3 for Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing
Figure 4 for Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing
Viaarxiv icon