DenseNet-based depth-width double reinforced deep learning neural network for high-resolution remote sensing image per-pixel classification
Y Tao, M Xu, Z Lu, Y Zhong - Remote Sensing, 2018 - mdpi.com
Deep neural networks (DNNs) face many problems in the very high resolution remote
sensing (VHRRS) per-pixel classification field. Among the problems is the fact that as the …
sensing (VHRRS) per-pixel classification field. Among the problems is the fact that as the …
Spoofed voice detection using dense features of stft and mdct spectrograms
Attestation of audio signals for recognition of forgery in voice is challenging task. In this
research work, a deep convolutional neural network (CNN) is utilized to detect audio …
research work, a deep convolutional neural network (CNN) is utilized to detect audio …
Deep-Wavelets and convolutional neural networks to support breast cancer diagnosis on thermography images
VA de Freitas Barbosa, A Félix da Silva… - Computer Methods in …, 2023 - Taylor & Francis
Breast cancer is the most dangerous type of cancer and one of the most lethal for women,
both in underdeveloped and central countries. Breast thermography is an emerging imaging …
both in underdeveloped and central countries. Breast thermography is an emerging imaging …
Combining data augmentations for CNN-based voice command recognition
This paper presents combining two data augmentation methods involving speed
perturbation and room impulse response reverberation for the purpose of improving the …
perturbation and room impulse response reverberation for the purpose of improving the …
A Pre-Training Framework Based on Multi-Order Acoustic Simulation for Replay Voice Spoofing Detection
Voice spoofing attempts to break into a specific automatic speaker verification (ASV) system
by forging the user's voice and can be used through methods such as text-to-speech (TTS) …
by forging the user's voice and can be used through methods such as text-to-speech (TTS) …
Detection of voice transformation spoofing based on dense convolutional network
Y Wang, Z Su - … 2019-2019 IEEE International Conference on …, 2019 - ieeexplore.ieee.org
Nowadays, speech spoofing is so common that it presents a great challenge to social
security. Thus, it is of great significance to recognize a spoofed speech from a genuine one …
security. Thus, it is of great significance to recognize a spoofed speech from a genuine one …
Classification of Pitch and Gender of Speakers for Forensic Speaker Recognition from Disguised Voices Using Novel Features Learned by Deep Convolutional Neural …
AM Nair, SP Savithri - Traitement du Signal, 2021 - search.ebscohost.com
Voice disguise is a major concern in forensic automatic speaker recognition (FASR).
Classifying the type of disguise is very important for speaker recognition. Pitch disguise is a …
Classifying the type of disguise is very important for speaker recognition. Pitch disguise is a …
Pre-training of multi-order acoustic simulation for replay voice spoofing detection
Voice spoofing attempts to break into a specific automatic speaker verification (ASV) system
by forging the user's voice, and can be used through methods, such as text-to-speech (TTS) …
by forging the user's voice, and can be used through methods, such as text-to-speech (TTS) …
Identification of Weakly Pitch‐Shifted Voice Based on Convolutional Neural Network
Pitch shifting is a common voice editing technique in which the original pitch of a digital
voice is raised or lowered. It is likely to be abused by the malicious attacker to conceal …
voice is raised or lowered. It is likely to be abused by the malicious attacker to conceal …
UniVR: A Unified Framework for Pitch-Shifted Voice Restoration in Speaker Identification
Y Li, X Lin - 2023 Asia Pacific Signal and Information …, 2023 - ieeexplore.ieee.org
As an efficient spoofing attack, pitch scaling can conceal speakers' identities at a low cost by
raising or lowering the pitch in a linear style, making it harmful to the security of speaker …
raising or lowering the pitch in a linear style, making it harmful to the security of speaker …