Voiceblock: Privacy through real-time adversarial attacks with audio-to-audio models
As governments and corporations adopt deep learning systems to collect and analyze user-
generated audio data, concerns about security and privacy naturally emerge in areas such …
generated audio data, concerns about security and privacy naturally emerge in areas such …
Breaking Security-Critical Voice Authentication
Voice authentication (VA) has recently become an integral part in numerous security-critical
operations, such as bank transactions and call center conversations. The vulnerability of …
operations, such as bank transactions and call center conversations. The vulnerability of …
Beyond neural-on-neural approaches to speaker gender protection
Recent research has proposed approaches that modify speech to defend against gender
inference attacks. The goal of these protection algorithms is to control the availability of …
inference attacks. The goal of these protection algorithms is to control the availability of …
[PDF][PDF] Beyond Neural-on-Neural Approaches to Speaker Gender Protection
Z Liu, N Vaessen, M Larson - 2023 - repository.ubn.ru.nl
Recent research has proposed approaches that modify speech to defend against gender
inference attacks. The goal of these protection algorithms is to control the availability of …
inference attacks. The goal of these protection algorithms is to control the availability of …