Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward
Easy access to audio-visual content on social media, combined with the availability of
modern tools such as Tensorflow or Keras, and open-source trained models, along with …
modern tools such as Tensorflow or Keras, and open-source trained models, along with …
Breaking Security-Critical Voice Authentication
Voice authentication (VA) has recently become an integral part in numerous security-critical
operations, such as bank transactions and call center conversations. The vulnerability of …
operations, such as bank transactions and call center conversations. The vulnerability of …
Robustness of speech spoofing detectors against adversarial post-processing of voice conversion
With the development of speech synthesis and voice conversion techniques, the quality of
artificially generated speech has been significantly improved and detecting such spoofing …
artificially generated speech has been significantly improved and detecting such spoofing …
Enhancing Security and Accountability in Autonomous Vehicles through Robust Speaker Identification and Blockchain-Based Event Recording
As the deployment of Autonomous Vehicles (AVs) gains momentum, ensuring both security
and accountability becomes paramount. This paper proposes a comprehensive approach to …
and accountability becomes paramount. This paper proposes a comprehensive approach to …
[PDF][PDF] Adversarial Voice Conversion Against Neural Spoofing Detectors.
The naturalness and similarity of voice conversion have been significantly improved in
recent years with the development of deep-learning-based conversion models and neural …
recent years with the development of deep-learning-based conversion models and neural …