A survey on differential privacy for unstructured data content
Huge amounts of unstructured data including image, video, audio, and text are ubiquitously
generated and shared, and it is a challenge to protect sensitive personal information in …
generated and shared, and it is a challenge to protect sensitive personal information in …
Speaker recognition based on deep learning: An overview
Speaker recognition is a task of identifying persons from their voices. Recently, deep
learning has dramatically revolutionized speaker recognition. However, there is lack of …
learning has dramatically revolutionized speaker recognition. However, there is lack of …
LEAF: A learnable frontend for audio classification
Mel-filterbanks are fixed, engineered audio features which emulate human perception and
have been used through the history of audio understanding up to today. However, their …
have been used through the history of audio understanding up to today. However, their …
A survey of speaker recognition: Fundamental theories, recognition methods and opportunities
Humans can identify a speaker by listening to their voice, over the telephone, or on any
digital devices. Acquiring this congenital human competency, authentication technologies …
digital devices. Acquiring this congenital human competency, authentication technologies …
[PDF][PDF] x-Vectors Meet Adversarial Attacks: Benchmarking Adversarial Robustness in Speaker Verification.
Abstract Automatic Speaker Verification (ASV) enables high-security applications like user
authentication or criminal investigation. However, ASV can be subjected to malicious …
authentication or criminal investigation. However, ASV can be subjected to malicious …
[PDF][PDF] Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples.
Spoofing countermeasure systems protect Automatic Speaker Verification (ASV) systems
from spoofing attacks such as replay, synthesis, and conversion. However, research has …
from spoofing attacks such as replay, synthesis, and conversion. However, research has …
Study of pre-processing defenses against adversarial attacks on state-of-the-art speaker recognition systems
Adversarial examples are designed to fool the speaker recognition (SR) system by adding a
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …
carefully crafted human-imperceptible noise to the speech signals. Posing a severe security …
Using x-vectors to automatically detect parkinson's disease from speech
The promise of new neuroprotective treatments to stop or slow the advance of Parkinson's
Disease (PD) urges for new biomarkers or detection schemes that can deliver a faster …
Disease (PD) urges for new biomarkers or detection schemes that can deliver a faster …
Deep speaker embeddings for far-field speaker recognition on short utterances
Speaker recognition systems based on deep speaker embeddings have achieved
significant performance in controlled conditions according to the results obtained for early …
significant performance in controlled conditions according to the results obtained for early …
[HTML][HTML] Advancing a paradigm shift in evaluation of forensic evidence: The rise of forensic data science
GS Morrison - Forensic Science International: Synergy, 2022 - Elsevier
Widespread practice across the majority of branches of forensic science uses analytical
methods based on human perception, and interpretive methods based on subjective …
methods based on human perception, and interpretive methods based on subjective …