Alert button

Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems

Jun 18, 2022
Danwei Cai, Zexin Cai, Ming Li

Figure 1 for Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems
Figure 2 for Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems
Figure 3 for Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems
Figure 4 for Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: