Picture for Nicholas Evans

Nicholas Evans

Range-Based Equal Error Rate for Spoof Localization

Add code
May 28, 2023
Figure 1 for Range-Based Equal Error Rate for Spoof Localization
Figure 2 for Range-Based Equal Error Rate for Spoof Localization
Figure 3 for Range-Based Equal Error Rate for Spoof Localization
Figure 4 for Range-Based Equal Error Rate for Spoof Localization
Viaarxiv icon

Can spoofing countermeasure and speaker verification systems be jointly optimised?

Add code
Mar 31, 2023
Viaarxiv icon

ASVspoof 2021: Towards Spoofed and Deepfake Speech Detection in the Wild

Add code
Oct 05, 2022
Figure 1 for ASVspoof 2021: Towards Spoofed and Deepfake Speech Detection in the Wild
Figure 2 for ASVspoof 2021: Towards Spoofed and Deepfake Speech Detection in the Wild
Figure 3 for ASVspoof 2021: Towards Spoofed and Deepfake Speech Detection in the Wild
Figure 4 for ASVspoof 2021: Towards Spoofed and Deepfake Speech Detection in the Wild
Viaarxiv icon

The VoicePrivacy 2020 Challenge Evaluation Plan

Add code
May 14, 2022
Figure 1 for The VoicePrivacy 2020 Challenge Evaluation Plan
Figure 2 for The VoicePrivacy 2020 Challenge Evaluation Plan
Figure 3 for The VoicePrivacy 2020 Challenge Evaluation Plan
Figure 4 for The VoicePrivacy 2020 Challenge Evaluation Plan
Viaarxiv icon

The PartialSpoof Database and Countermeasures for the Detection of Short Generated Audio Segments Embedded in a Speech Utterance

Add code
Apr 28, 2022
Figure 1 for The PartialSpoof Database and Countermeasures for the Detection of Short Generated Audio Segments Embedded in a Speech Utterance
Figure 2 for The PartialSpoof Database and Countermeasures for the Detection of Short Generated Audio Segments Embedded in a Speech Utterance
Figure 3 for The PartialSpoof Database and Countermeasures for the Detection of Short Generated Audio Segments Embedded in a Speech Utterance
Figure 4 for The PartialSpoof Database and Countermeasures for the Detection of Short Generated Audio Segments Embedded in a Speech Utterance
Viaarxiv icon

Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion

Add code
Apr 21, 2022
Figure 1 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 2 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 3 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 4 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Viaarxiv icon

SASV 2022: The First Spoofing-Aware Speaker Verification Challenge

Add code
Mar 28, 2022
Figure 1 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 2 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 3 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Figure 4 for SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
Viaarxiv icon

The VoicePrivacy 2022 Challenge Evaluation Plan

Add code
Mar 27, 2022
Figure 1 for The VoicePrivacy 2022 Challenge Evaluation Plan
Figure 2 for The VoicePrivacy 2022 Challenge Evaluation Plan
Figure 3 for The VoicePrivacy 2022 Challenge Evaluation Plan
Figure 4 for The VoicePrivacy 2022 Challenge Evaluation Plan
Viaarxiv icon

Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation

Add code
Feb 28, 2022
Figure 1 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 2 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 3 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Figure 4 for Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation
Viaarxiv icon

Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations

Add code
Feb 28, 2022
Figure 1 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 2 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 3 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 4 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Viaarxiv icon