Alert button
Picture for Ville Vestman

Ville Vestman

Alert button

ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech

Feb 11, 2021
Andreas Nautsch, Xin Wang, Nicholas Evans, Tomi Kinnunen, Ville Vestman, Massimiliano Todisco, Héctor Delgado, Md Sahidullah, Junichi Yamagishi, Kong Aik Lee

Figure 1 for ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
Figure 2 for ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
Figure 3 for ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
Figure 4 for ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
Viaarxiv icon

Extrapolating false alarm rates in automatic speaker verification

Aug 08, 2020
Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee

Figure 1 for Extrapolating false alarm rates in automatic speaker verification
Figure 2 for Extrapolating false alarm rates in automatic speaker verification
Viaarxiv icon

UIAI System for Short-Duration Speaker Verification Challenge 2020

Jul 26, 2020
Md Sahidullah, Achintya Kumar Sarkar, Ville Vestman, Xuechen Liu, Romain Serizel, Tomi Kinnunen, Zheng-Hua Tan, Emmanuel Vincent

Figure 1 for UIAI System for Short-Duration Speaker Verification Challenge 2020
Figure 2 for UIAI System for Short-Duration Speaker Verification Challenge 2020
Figure 3 for UIAI System for Short-Duration Speaker Verification Challenge 2020
Figure 4 for UIAI System for Short-Duration Speaker Verification Challenge 2020
Viaarxiv icon

Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals

Jul 12, 2020
Tomi Kinnunen, Héctor Delgado, Nicholas Evans, Kong Aik Lee, Ville Vestman, Andreas Nautsch, Massimiliano Todisco, Xin Wang, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds

Figure 1 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 2 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 3 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 4 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Viaarxiv icon

Neural i-vectors

Apr 18, 2020
Ville Vestman, Kong Aik Lee, Tomi H. Kinnunen

Figure 1 for Neural i-vectors
Figure 2 for Neural i-vectors
Figure 3 for Neural i-vectors
Figure 4 for Neural i-vectors
Viaarxiv icon

Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores

Nov 04, 2019
Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee

Figure 1 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 2 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 3 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 4 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Viaarxiv icon

Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration

Jun 20, 2019
Ville Vestman, Kong Aik Lee, Tomi H. Kinnunen, Takafumi Koshinaka

Figure 1 for Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration
Figure 2 for Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration
Figure 3 for Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration
Viaarxiv icon

Voice Mimicry Attacks Assisted by Automatic Speaker Verification

Jun 03, 2019
Ville Vestman, Tomi Kinnunen, Rosa González Hautamäki, Md Sahidullah

Figure 1 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 2 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 3 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 4 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Viaarxiv icon

I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences

Apr 16, 2019
Kong Aik Lee, Ville Hautamaki, Tomi Kinnunen, Hitoshi Yamamoto, Koji Okabe, Ville Vestman, Jing Huang, Guohong Ding, Hanwu Sun, Anthony Larcher, Rohan Kumar Das, Haizhou Li, Mickael Rouvier, Pierre-Michel Bousquet, Wei Rao, Qing Wang, Chunlei Zhang, Fahimeh Bahmaninezhad, Hector Delgado, Jose Patino, Qiongqiong Wang, Ling Guo, Takafumi Koshinaka, Jiacen Zhang, Koichi Shinoda, Trung Ngo Trong, Md Sahidullah, Fan Lu, Yun Tang, Ming Tu, Kah Kuan Teh, Huy Dat Tran, Kuruvachan K. George, Ivan Kukanov, Florent Desnous, Jichen Yang, Emre Yilmaz, Longting Xu, Jean-Francois Bonastre, Chenglin Xu, Zhi Hao Lim, Eng Siong Chng, Shivesh Ranjan, John H. L. Hansen, Massimiliano Todisco, Nicholas Evans

Figure 1 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 2 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 3 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 4 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Viaarxiv icon