Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
ASSERT: Anti-spoofing with squeeze-excitation and residual networks
We present JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with
Squeeze-Excitation and Residual neTworks (ASSERT). Anti-spoofing has gathered more …
Squeeze-Excitation and Residual neTworks (ASSERT). Anti-spoofing has gathered more …
Advances in anti-spoofing: from the perspective of ASVspoof challenges
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …
This leads to an increased interest to secure these voice biometric systems for real-world …
Attentive filtering networks for audio replay attack detection
An attacker may use a variety of techniques to fool an automatic speaker verification system
into accepting them as a genuine user. Anti-spoofing methods meanwhile aim to make the …
into accepting them as a genuine user. Anti-spoofing methods meanwhile aim to make the …
Cross-modal information fusion for voice spoofing detection
In recent years, speaker verification systems have been used in many production scenarios.
Unfortunately, they are still very vulnerable to different kinds of spoofing attacks, such as …
Unfortunately, they are still very vulnerable to different kinds of spoofing attacks, such as …
[PDF][PDF] The SJTU robust anti-spoofing system for the ASVspoof 2019 challenge.
The robustness of an anti-spoofing system is progressively more important in order to
develop a reliable speaker verification system. Previous challenges and datasets mainly …
develop a reliable speaker verification system. Previous challenges and datasets mainly …
Generalized voice spoofing detection via integral knowledge amalgamation
Y Ren, H Peng, L Li, X Xue, Y Lan… - IEEE/ACM Transactions …, 2023 - ieeexplore.ieee.org
Most of the voice spoofing detection methods are designed for specific kinds of spoofing
attacks, synthetic or replay. In practice, however, there is no prior information about these …
attacks, synthetic or replay. In practice, however, there is no prior information about these …
Countermeasures to replay attacks: A review
Replay attack is an attempt of using pre-recorded speech samples of any target for acquiring
unauthorized access to the automatic speaker verification (ASV) system. It is a low …
unauthorized access to the automatic speaker verification (ASV) system. It is a low …
Gammatone spectral latitude features extraction for pathological voice detection and classification
C Zhou, Y Wu, Z Fan, X Zhang, D Wu, Z Tao - Applied Acoustics, 2022 - Elsevier
To improve the performance of pathological voice detection and classification, gammatone
spectral latitude (GTSL) features were proposed. GTSL features are inspired by the …
spectral latitude (GTSL) features were proposed. GTSL features are inspired by the …
A survey on replay attack detection for automatic speaker verification (ASV) system
In this paper, we present a brief survey of various approaches used to detect replay attack
for Automatic Speaker Verification (ASV) system. The replay spoofing attack is the most …
for Automatic Speaker Verification (ASV) system. The replay spoofing attack is the most …
New replay attack detection using iterative adaptive inverse filtering and high frequency band
KP Bharath, MR Kumar - Expert systems with Applications, 2022 - Elsevier
Replay attack is most vulnerable to automatic speaker verification system, where the frauds
get the access by replaying pre-recorded voice samples of the genuine speakers. In this …
get the access by replaying pre-recorded voice samples of the genuine speakers. In this …