Picture for Wanying Ge

Wanying Ge

Spoofing attack augmentation: can differently-trained attack models improve generalisation?

Add code
Sep 18, 2023
Figure 1 for Spoofing attack augmentation: can differently-trained attack models improve generalisation?
Figure 2 for Spoofing attack augmentation: can differently-trained attack models improve generalisation?
Figure 3 for Spoofing attack augmentation: can differently-trained attack models improve generalisation?
Viaarxiv icon

Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

Add code
Jun 13, 2023
Figure 1 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 2 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 3 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 4 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Viaarxiv icon

Can spoofing countermeasure and speaker verification systems be jointly optimised?

Add code
Mar 31, 2023
Figure 1 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 2 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 3 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 4 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Viaarxiv icon

Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations

Add code
Feb 28, 2022
Figure 1 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 2 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 3 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 4 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Viaarxiv icon

Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations

Add code
Oct 07, 2021
Figure 1 for Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations
Figure 2 for Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations
Figure 3 for Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations
Figure 4 for Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations
Viaarxiv icon

Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection

Add code
Jul 26, 2021
Figure 1 for Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection
Figure 2 for Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection
Figure 3 for Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection
Figure 4 for Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection
Viaarxiv icon

Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection

Add code
Apr 07, 2021
Figure 1 for Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection
Figure 2 for Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection
Figure 3 for Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection
Figure 4 for Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection
Viaarxiv icon