Distributed consensus of heterogeneous switched nonlinear multiagent systems with input quantization and DoS attacks

S Guo, X Zhao, H Wang, N Xu - Applied Mathematics and Computation, 2023 - Elsevier
In this paper, the consensus tracking control problem is investigated for a class of
heterogeneous switched nonlinear multiagent systems (MASs) with input quantization under …

ASSERT: Anti-spoofing with squeeze-excitation and residual networks

CI Lai, N Chen, J Villalba, N Dehak - arxiv preprint arxiv:1904.01120, 2019 - arxiv.org
We present JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with
Squeeze-Excitation and Residual neTworks (ASSERT). Anti-spoofing has gathered more …

Noise robust automatic speaker verification systems: review and analysis

S Joshi, M Dua - Telecommunication Systems, 2024 - Springer
Like any other biometric systems, Automatic Speaker Verification (ASV) systems are also
vulnerable to the spoofing attacks. Hence, it is important to develop the countermeasures in …

Attentive filtering networks for audio replay attack detection

CI Lai, A Abad, K Richmond… - ICASSP 2019-2019 …, 2019 - ieeexplore.ieee.org
An attacker may use a variety of techniques to fool an automatic speaker verification system
into accepting them as a genuine user. Anti-spoofing methods meanwhile aim to make the …

Cross-modal information fusion for voice spoofing detection

J Xue, H Zhou, H Song, B Wu, L Shi - Speech Communication, 2023 - Elsevier
In recent years, speaker verification systems have been used in many production scenarios.
Unfortunately, they are still very vulnerable to different kinds of spoofing attacks, such as …

Countermeasures to replay attacks: A review

M Singh, D Pati - IETE Technical Review, 2020 - Taylor & Francis
Replay attack is an attempt of using pre-recorded speech samples of any target for acquiring
unauthorized access to the automatic speaker verification (ASV) system. It is a low …

[HTML][HTML] A robust voice spoofing detection system using novel CLS-LBP features and LSTM

H Dawood, S Saleem, F Hassan, A Javed - Journal of King Saud University …, 2022 - Elsevier
Abstract Automatic Speaker Verification (ASV) systems are vulnerable to a variety of voice
spoofing attacks, eg, replays, speech synthesis, etc. The imposters/fraudsters often use …

Long-term high frequency features for synthetic speech detection

J Yang, RK Das - Digital Signal Processing, 2020 - Elsevier
Over the recent years, detection of spoofing attack has become pivotal for automatic speaker
verification systems. The long-term information has been found to be useful for the detection …

Generalized spoofing detection inspired from audio generation artifacts

Y Gao, T Vuong, M Elyasi, G Bharaj, R Singh - arxiv preprint arxiv …, 2021 - arxiv.org
State-of-the-art methods for audio generation suffer from fingerprint artifacts and repeated
inconsistencies across temporal and spectral domains. Such artifacts could be well captured …

New replay attack detection using iterative adaptive inverse filtering and high frequency band

KP Bharath, MR Kumar - Expert systems with Applications, 2022 - Elsevier
Replay attack is most vulnerable to automatic speaker verification system, where the frauds
get the access by replaying pre-recorded voice samples of the genuine speakers. In this …