Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of speaker recognition: Fundamental theories, recognition methods and opportunities
Humans can identify a speaker by listening to their voice, over the telephone, or on any
digital devices. Acquiring this congenital human competency, authentication technologies …
digital devices. Acquiring this congenital human competency, authentication technologies …
Emerging Wearable Acoustic Sensing Technologies
Sound signals not only serve as the primary communication medium but also find
application in fields such as medical diagnosis and fault detection. With public healthcare …
application in fields such as medical diagnosis and fault detection. With public healthcare …
[책][B] The Routledge handbook of forensic linguistics
M Coulthard, A Johnson - 2010 - api.taylorfrancis.com
The Handbook is a unique work of reference to the leading ideas, debates, topics,
approaches and methodologies in forensic linguistics and language and the law. It …
approaches and methodologies in forensic linguistics and language and the law. It …
[HTML][HTML] Improving speaker de-identification with functional data analysis of f0 trajectories
Due to a constantly increasing amount of speech data that is stored in different types of
databases, voice privacy has become a major concern. To respond to such concern, speech …
databases, voice privacy has become a major concern. To respond to such concern, speech …
The potential for acoustic individual identification in mammals
Many studies have revealed that animal vocalizations, including those from mammals, are
individually distinctive. Therefore, acoustic identification of individuals (AIID) has been …
individually distinctive. Therefore, acoustic identification of individuals (AIID) has been …
Voice mimicry attacks assisted by automatic speaker verification
In this work, we simulate a scenario, where a publicly available ASV system is used to
enhance mimicry attacks against another closed source ASV system. In specific, ASV …
enhance mimicry attacks against another closed source ASV system. In specific, ASV …
[HTML][HTML] Speech-based support system to supervise chronic obstructive pulmonary disease patient status
M Farrús, J Codina-Filbà, E Reixach, E Andrés… - Applied Sciences, 2021 - mdpi.com
Featured Application This work represents a proof of concept for COPD patient supervision,
which can lead to a potential application related to home monitoring for clinicians working …
which can lead to a potential application related to home monitoring for clinicians working …
[PDF][PDF] A review on state-of-the-art Automatic Speaker verification system from spoofing and anti-spoofing perspective
Abstract Background/Objectives: The anti-spoofing measures are blooming with an aim to
protect the Automatic Speaker Verification systems from susceptible spoofing attacks. This …
protect the Automatic Speaker Verification systems from susceptible spoofing attacks. This …
Development of a regional voice dataset and speaker classification based on machine learning
At present, voice biometrics are commonly used for identification and authentication of users
through their voice. Voice based services such as mobile banking, access to personal …
through their voice. Voice based services such as mobile banking, access to personal …
Controlled voice quality modifications
T Nechanský, A Houzar, T Bořil… - … International Journal of …, 2024 - utppublishing.com
Within-speaker variability, which results from the plasticity of speech production, is an
inherent feature of speaker comparison. This study examines targeted modifications of voice …
inherent feature of speaker comparison. This study examines targeted modifications of voice …