Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward

M Masood, M Nawaz, KM Malik, A Javed, A Irtaza… - Applied …, 2023 - Springer
Easy access to audio-visual content on social media, combined with the availability of
modern tools such as Tensorflow or Keras, and open-source trained models, along with …

Breaking Security-Critical Voice Authentication

A Kassis, U Hengartner - 2023 IEEE Symposium on Security …, 2023 - ieeexplore.ieee.org
Voice authentication (VA) has recently become an integral part in numerous security-critical
operations, such as bank transactions and call center conversations. The vulnerability of …

Robustness of speech spoofing detectors against adversarial post-processing of voice conversion

YY Ding, HJ Lin, LJ Liu, ZH Ling… - IEEE/ACM Transactions …, 2021 - ieeexplore.ieee.org
With the development of speech synthesis and voice conversion techniques, the quality of
artificially generated speech has been significantly improved and detecting such spoofing …

Enhancing Security and Accountability in Autonomous Vehicles through Robust Speaker Identification and Blockchain-Based Event Recording

JN Njoku, CI Nwakanma, JM Lee, DS Kim - Electronics, 2023 - mdpi.com
As the deployment of Autonomous Vehicles (AVs) gains momentum, ensuring both security
and accountability becomes paramount. This paper proposes a comprehensive approach to …

[PDF][PDF] Adversarial Voice Conversion Against Neural Spoofing Detectors.

YY Ding, LJ Liu, Y Hu, ZH Ling - Interspeech, 2021 - isca-archive.org
The naturalness and similarity of voice conversion have been significantly improved in
recent years with the development of deep-learning-based conversion models and neural …