Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy–enhancing face biometrics: A comprehensive survey
Biometric recognition technology has made significant advances over the last decade and is
now used across a number of services and applications. However, this widespread …
now used across a number of services and applications. However, this widespread …
Identity and content authentication for phone calls
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
Speaker anonymization using x-vector and neural waveform models
The social media revolution has produced a plethora of web services to which users can
easily upload and share multimedia documents. Despite the popularity and convenience of …
easily upload and share multimedia documents. Despite the popularity and convenience of …
Automatic versus human speaker verification: The case of voice mimicry
In this work, we compare the performance of three modern speaker verification systems and
non-expert human listeners in the presence of voice mimicry. Our goal is to gain insights on …
non-expert human listeners in the presence of voice mimicry. Our goal is to gain insights on …
Biometric identity systems in law enforcement and the politics of (voice) recognition: The case of SiiP
Biometric identity systems are now a prominent feature of contemporary law enforcement,
including in Europe. Often advanced on the premise of efficiency and accuracy, they have …
including in Europe. Often advanced on the premise of efficiency and accuracy, they have …
{AuthLoop}:{End-to-End} cryptographic authentication for telephony over voice channels
Telephones remain a trusted platform for conducting some of our most sensitive exchanges.
From banking to taxes, wide swathes of industry and government rely on telephony as a …
From banking to taxes, wide swathes of industry and government rely on telephony as a …
{AuthentiCall}: Efficient Identity and Content Authentication for Phone Calls
Phones are used to confirm some of our most sensitive transactions. From coordination
between energy providers in the power grid to corroboration of high-value transfers with a …
between energy providers in the power grid to corroboration of high-value transfers with a …
Speaker anonymization using generative adversarial networks
The advent use of smart devices has enabled the emergence of many applications that
facilitate user interaction through speech. However, speech reveals private and sensitive …
facilitate user interaction through speech. However, speech reveals private and sensitive …
Research of neural network classifier in speaker recognition module for automated system of critical use
MM Bykov, VV Kovtun, A Smolarz… - … , Industry, and High …, 2017 - spiedigitallibrary.org
The article studies the dependence of the quality of speakers recognition by convolutional
neural network from the type of chosen informative features for use it in automated systems …
neural network from the type of chosen informative features for use it in automated systems …
I know that voice: Identifying the voice actor behind the voice
Intentional voice modifications by electronic or nonelectronic means challenge automatic
speaker recognition systems. Previous work focused on detecting the act of disguise or …
speaker recognition systems. Previous work focused on detecting the act of disguise or …