A survey on differential privacy for unstructured data content

Y Zhao, J Chen - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Huge amounts of unstructured data including image, video, audio, and text are ubiquitously
generated and shared, and it is a challenge to protect sensitive personal information in …

Speaker recognition based on deep learning: An overview

Z Bai, XL Zhang - Neural Networks, 2021 - Elsevier
Speaker recognition is a task of identifying persons from their voices. Recently, deep
learning has dramatically revolutionized speaker recognition. However, there is lack of …

LEAF: A learnable frontend for audio classification

N Zeghidour, O Teboul, FDC Quitry… - arxiv preprint arxiv …, 2021 - arxiv.org
Mel-filterbanks are fixed, engineered audio features which emulate human perception and
have been used through the history of audio understanding up to today. However, their …

A survey of speaker recognition: Fundamental theories, recognition methods and opportunities

MM Kabir, MF Mridha, J Shin, I Jahan, AQ Ohi - IEEE Access, 2021 - ieeexplore.ieee.org
Humans can identify a speaker by listening to their voice, over the telephone, or on any
digital devices. Acquiring this congenital human competency, authentication technologies …

[PDF][PDF] x-Vectors Meet Adversarial Attacks: Benchmarking Adversarial Robustness in Speaker Verification.

J Villalba, Y Zhang, N Dehak - Interspeech, 2020 - interspeech2020.org
Abstract Automatic Speaker Verification (ASV) enables high-security applications like user
authentication or criminal investigation. However, ASV can be subjected to malicious …

[PDF][PDF] Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples.

Y Zhang, Z Jiang, J Villalba, N Dehak - Interspeech, 2020 - isca-archive.org
Spoofing countermeasure systems protect Automatic Speaker Verification (ASV) systems
from spoofing attacks such as replay, synthesis, and conversion. However, research has …

Study of pre-processing defenses against adversarial attacks on state-of-the-art speaker recognition systems

S Joshi, J Villalba, P Żelasko… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Adversarial examples are designed to fool the speaker recognition (SR) system by adding a
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …

Using x-vectors to automatically detect parkinson's disease from speech

L Moro-Velazquez, J Villalba… - ICASSP 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
The promise of new neuroprotective treatments to stop or slow the advance of Parkinson's
Disease (PD) urges for new biomarkers or detection schemes that can deliver a faster …

Deep speaker embeddings for far-field speaker recognition on short utterances

A Gusev, V Volokhov, T Andzhukaev… - arxiv preprint arxiv …, 2020 - arxiv.org
Speaker recognition systems based on deep speaker embeddings have achieved
significant performance in controlled conditions according to the results obtained for early …

[HTML][HTML] Advancing a paradigm shift in evaluation of forensic evidence: The rise of forensic data science

GS Morrison - Forensic Science International: Synergy, 2022 - Elsevier
Widespread practice across the majority of branches of forensic science uses analytical
methods based on human perception, and interpretive methods based on subjective …