Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Surveying the development of biometric user authentication on mobile phones
Designing reliable user authentication on mobile phones is becoming an increasingly
important task to protect users' private information and data. Since biometric approaches can …
important task to protect users' private information and data. Since biometric approaches can …
A review of recent advances on deep learning methods for audio-visual speech recognition
This article provides a detailed review of recent advances in audio-visual speech
recognition (AVSR) methods that have been developed over the last decade (2013–2023) …
recognition (AVSR) methods that have been developed over the last decade (2013–2023) …
VC3: Trustworthy data analytics in the cloud using SGX
We present VC3, the first system that allows users to run distributed MapReduce
computations in the cloud while kee** their code and data secret, and ensuring the …
computations in the cloud while kee** their code and data secret, and ensuring the …
Seeing voices and hearing faces: Cross-modal biometric matching
A Nagrani, S Albanie… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
We introduce a seemingly impossible task: given only an audio clip of someone speaking,
decide which of two face images is the speaker. In this paper we study this, and a number of …
decide which of two face images is the speaker. In this paper we study this, and a number of …
Learnable pins: Cross-modal embeddings for person identity
A Nagrani, S Albanie… - Proceedings of the …, 2018 - openaccess.thecvf.com
We propose and investigate an identity sensitive joint embedding of face and voice. Such an
embedding enables cross-modal retrieval from voice to face and from face to voice. We …
embedding enables cross-modal retrieval from voice to face and from face to voice. We …
Bias in automated speaker recognition
Automated speaker recognition uses data processing to identify speakers by their voice.
Today, automated speaker recognition is deployed on billions of smart devices and in …
Today, automated speaker recognition is deployed on billions of smart devices and in …
[HTML][HTML] Voice spoofing detection for multiclass attack classification using deep learning
Voice biometric authentication is increasingly gaining adoption in organisations with high-
volume identity verifications and for providing access to physical and other virtual spaces. In …
volume identity verifications and for providing access to physical and other virtual spaces. In …
Learning human identity from motion patterns
We present a large-scale study exploring the capability of temporal deep neural networks to
interpret natural human kinematics and introduce the first method for active biometric …
interpret natural human kinematics and introduce the first method for active biometric …
On the vulnerability of speaker verification to realistic voice spoofing
Automatic speaker verification (ASV) systems are subject to various kinds of malicious
attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the …
attacks. Replay, voice conversion and speech synthesis attacks drastically degrade the …
Continuously reproducing toolchains in pattern recognition and machine learning experiments
Pattern recognition and machine learning research work often contains experimental results
on real-world data, which corroborates hypotheses and provides a canvas for the …
on real-world data, which corroborates hypotheses and provides a canvas for the …