Deep audio-visual learning: A survey

H Zhu, MD Luo, R Wang, AH Zheng, R He - International Journal of …, 2021 - Springer
Audio-visual learning, aimed at exploiting the relationship between audio and visual
modalities, has drawn considerable attention since deep learning started to be used …

Automatic speaker verification systems and spoof detection techniques: review and analysis

A Mittal, M Dua - International Journal of Speech Technology, 2022 - Springer
Automatic speaker verification (ASV) systems are enhanced enough, that industry is
attracted to use them practically in security systems. However, vulnerability of these systems …

[PDF][PDF] A light convolutional GRU-RNN deep feature extractor for ASV spoofing detection

A Gomez-Alanis, AM Peinado, JA Gonzalez… - Proc …, 2019 - isca-archive.org
The aim of this work is to develop a single anti-spoofing system which can be applied to
effectively detect all the types of spoofing attacks considered in the ASVspoof 2019 …

Enhancing IoT security via cancelable HD-sEMG-based biometric authentication password, encoded by gesture

X Jiang, X Liu, J Fan, X Ye, C Dai… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Enhancing information security via reliable user authentication in wireless body area
network (WBAN)-based Internet-of-Things (IoT) applications has attracted increasing …

Modified magnitude-phase spectrum information for spoofing detection

J Yang, H Wang, RK Das, Y Qian - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
Most of the existing feature representations for spoofing countermeasures consider
information either from the magnitude or phase spectrum. We hypothesize that both …

A gated recurrent convolutional neural network for robust spoofing detection

A Gomez-Alanis, AM Peinado… - … on Audio, Speech …, 2019 - ieeexplore.ieee.org
Automatic speaker verification (ASV) systems are exposed to spoofing attacks which may
compromise their security. While anti-spoofing techniques have been mainly studied for …

Watch this space: Securing satellite communication through resilient transmitter fingerprinting

J Smailes, S Köhler, S Birnbach, M Strohmeier… - Proceedings of the …, 2023 - dl.acm.org
Due to an increase in the availability of cheap off-the-shelf radio hardware, signal spoofing
and replay attacks on satellite ground systems have become more accessible than ever …

[PDF][PDF] Siamese Convolutional Neural Network Using Gaussian Probability Feature for Spoofing Speech Detection.

Z Lei, Y Yang, C Liu, J Ye - Interspeech, 2020 - interspeech2020.org
The security and reliability of automatic speaker verification systems can be threatened by
different types of spoofing attacks using speech synthetic, voice conversion, or replay. The 2 …

A kernel density estimation based loss function and its application to asv-spoofing detection

A Gomez-Alanis, JA Gonzalez-Lopez… - IEEE Access, 2020 - ieeexplore.ieee.org
Biometric systems are exposed to spoofing attacks which may compromise their security,
and voice biometrics, also known as automatic speaker verification (ASV), is no exception …

New acoustic features for synthetic and replay spoofing attack detection

L Wei, Y Long, H Wei, Y Li - Symmetry, 2022 - mdpi.com
With the rapid development of intelligent speech technologies, automatic speaker
verification (ASV) has become one of the most natural and convenient biometric speaker …