Alert button
Picture for Rosa González Hautamäki

Rosa González Hautamäki

Alert button

How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning

Add code
Bookmark button
Alert button
May 31, 2023
Hye-jin Shim, Rosa González Hautamäki, Md Sahidullah, Tomi Kinnunen

Figure 1 for How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Figure 2 for How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Figure 3 for How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Figure 4 for How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
Viaarxiv icon

Improving speaker de-identification with functional data analysis of f0 trajectories

Add code
Bookmark button
Alert button
Mar 31, 2022
Lauri Tavi, Tomi Kinnunen, Rosa González Hautamäki

Figure 1 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 2 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 3 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 4 for Improving speaker de-identification with functional data analysis of f0 trajectories
Viaarxiv icon

Data Quality as Predictor of Voice Anti-Spoofing Generalization

Add code
Bookmark button
Alert button
Mar 26, 2021
Bhusan Chettri, Rosa González Hautamäki, Md Sahidullah, Tomi Kinnunen

Figure 1 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 2 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 3 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 4 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Viaarxiv icon

Voice Mimicry Attacks Assisted by Automatic Speaker Verification

Add code
Bookmark button
Alert button
Jun 03, 2019
Ville Vestman, Tomi Kinnunen, Rosa González Hautamäki, Md Sahidullah

Figure 1 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 2 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 3 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 4 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Viaarxiv icon

Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection

Add code
Bookmark button
Alert button
Nov 09, 2018
Tomi Kinnunen, Rosa González Hautamäki, Ville Vestman, Md Sahidullah

Figure 1 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 2 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 3 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 4 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Viaarxiv icon