Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep audio-visual learning: A survey
Audio-visual learning, aimed at exploiting the relationship between audio and visual
modalities, has drawn considerable attention since deep learning started to be used …
modalities, has drawn considerable attention since deep learning started to be used …
Automatic speaker verification systems and spoof detection techniques: review and analysis
A Mittal, M Dua - International Journal of Speech Technology, 2022 - Springer
Automatic speaker verification (ASV) systems are enhanced enough, that industry is
attracted to use them practically in security systems. However, vulnerability of these systems …
attracted to use them practically in security systems. However, vulnerability of these systems …
[PDF][PDF] A light convolutional GRU-RNN deep feature extractor for ASV spoofing detection
The aim of this work is to develop a single anti-spoofing system which can be applied to
effectively detect all the types of spoofing attacks considered in the ASVspoof 2019 …
effectively detect all the types of spoofing attacks considered in the ASVspoof 2019 …
Enhancing IoT security via cancelable HD-sEMG-based biometric authentication password, encoded by gesture
Enhancing information security via reliable user authentication in wireless body area
network (WBAN)-based Internet-of-Things (IoT) applications has attracted increasing …
network (WBAN)-based Internet-of-Things (IoT) applications has attracted increasing …
Modified magnitude-phase spectrum information for spoofing detection
Most of the existing feature representations for spoofing countermeasures consider
information either from the magnitude or phase spectrum. We hypothesize that both …
information either from the magnitude or phase spectrum. We hypothesize that both …
A gated recurrent convolutional neural network for robust spoofing detection
Automatic speaker verification (ASV) systems are exposed to spoofing attacks which may
compromise their security. While anti-spoofing techniques have been mainly studied for …
compromise their security. While anti-spoofing techniques have been mainly studied for …
Watch this space: Securing satellite communication through resilient transmitter fingerprinting
Due to an increase in the availability of cheap off-the-shelf radio hardware, signal spoofing
and replay attacks on satellite ground systems have become more accessible than ever …
and replay attacks on satellite ground systems have become more accessible than ever …
[PDF][PDF] Siamese Convolutional Neural Network Using Gaussian Probability Feature for Spoofing Speech Detection.
Z Lei, Y Yang, C Liu, J Ye - Interspeech, 2020 - interspeech2020.org
The security and reliability of automatic speaker verification systems can be threatened by
different types of spoofing attacks using speech synthetic, voice conversion, or replay. The 2 …
different types of spoofing attacks using speech synthetic, voice conversion, or replay. The 2 …
A kernel density estimation based loss function and its application to asv-spoofing detection
Biometric systems are exposed to spoofing attacks which may compromise their security,
and voice biometrics, also known as automatic speaker verification (ASV), is no exception …
and voice biometrics, also known as automatic speaker verification (ASV), is no exception …
New acoustic features for synthetic and replay spoofing attack detection
With the rapid development of intelligent speech technologies, automatic speaker
verification (ASV) has become one of the most natural and convenient biometric speaker …
verification (ASV) has become one of the most natural and convenient biometric speaker …