Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Breaking security-critical voice authentication
Voice authentication (VA) has recently become an integral part in numerous security-critical
operations, such as bank transactions and call center conversations. The vulnerability of …
operations, such as bank transactions and call center conversations. The vulnerability of …
Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
We present Malafide, a universal adversarial attack against automatic speaker verification
(ASV) spoofing countermeasures (CMs). By introducing convolutional noise using an …
(ASV) spoofing countermeasures (CMs). By introducing convolutional noise using an …
Waveform level adversarial example generation for joint attacks against both automatic speaker verification and spoofing countermeasures
X Zhang, X Zhang, W Liu, X Zou, M Sun… - Engineering Applications of …, 2022 - Elsevier
Adversarial examples crafted to deceive Automatic Speaker Verification (ASV) systems have
attracted a lot of attention when studying the vulnerability of ASV. However, real-world ASV …
attracted a lot of attention when studying the vulnerability of ASV. However, real-world ASV …
GANBA: Generative adversarial network for biometric anti-spoofing
Automatic speaker verification (ASV) is a voice biometric technology whose security might
be compromised by spoofing attacks. To increase the robustness against spoofing attacks …
be compromised by spoofing attacks. To increase the robustness against spoofing attacks …
Spoofing attack augmentation: Can differently-trained attack models improve generalisation?
A reliable deepfake detector or spoofing countermeasure (CM) should be robust in the face
of unpredictable spoofing attacks. To encourage the learning of more generaliseable …
of unpredictable spoofing attacks. To encourage the learning of more generaliseable …
语音伪造及检测技术研究综述
任延珍, 刘晨雨, 刘武洋, 王丽娜 - 信号处理, 2021 - signal.ejournal.org.cn
语音承载着人类语言和说话人身份信息, 通过语音伪造技术可以精确模仿目标说话人的声音以
达到欺骗人或机器听觉的目的. 目前, 深度伪造(Deepfake) **在对全球的政治经济及社会稳定带 …
达到欺骗人或机器听觉的目的. 目前, 深度伪造(Deepfake) **在对全球的政治经济及社会稳定带 …
Automatic speaker verification and replay attack detection system using novel glottal flow cepstrum coefficients
With the growing number of devices that use voice biometric system for verification
purposes, it becomes mandatory to accurately verify the target speaker. Moreover, intruders …
purposes, it becomes mandatory to accurately verify the target speaker. Moreover, intruders …
[PDF][PDF] On the application of conformers to logical access voice spoofing attack detection
Biometric systems are exposed to spoofing attacks which may compromise their security,
and automatic speaker verification (ASV) is no exception. To increase the robustness …
and automatic speaker verification (ASV) is no exception. To increase the robustness …
[PDF][PDF] Signal and Neural Processing against Spoofing Attacks and Deepfakes for Secure Voice Interaction (ASASVI)
The increasing sophistication of multimodal interaction systems, which enable human-like
communication, raises concerns regarding the authenticity of exchanged speech data. Our …
communication, raises concerns regarding the authenticity of exchanged speech data. Our …
On-Device Voice Authentication with Paralinguistic Privacy
Using our voices to access, and interact with, online services raises concerns about the
trade-offs between convenience, privacy, and security. The conflict between maintaining …
trade-offs between convenience, privacy, and security. The conflict between maintaining …