Picture for Rosa González Hautamäki

Rosa González Hautamäki

How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning

Add code
May 31, 2023
Figure 1 for How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Figure 2 for How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Figure 3 for How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Figure 4 for How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Viaarxiv icon

Improving speaker de-identification with functional data analysis of f0 trajectories

Add code
Mar 31, 2022
Figure 1 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 2 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 3 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 4 for Improving speaker de-identification with functional data analysis of f0 trajectories
Viaarxiv icon

Data Quality as Predictor of Voice Anti-Spoofing Generalization

Mar 26, 2021
Figure 1 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 2 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 3 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 4 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Viaarxiv icon

Voice Mimicry Attacks Assisted by Automatic Speaker Verification

Jun 03, 2019
Figure 1 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 2 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 3 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 4 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Viaarxiv icon

Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection

Nov 09, 2018
Figure 1 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 2 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 3 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 4 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Viaarxiv icon