Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
Introduction to voice presentation attack detection and recent advances
Over the past few years, significant progress has been made in the field of presentation
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …
attack detection (PAD) for automatic speaker recognition (ASV). This includes the …
The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection
The ASVspoof initiative was created to promote the development of countermeasures which
aim to protect automatic speaker verification (ASV) from spoofing attacks. The first …
aim to protect automatic speaker verification (ASV) from spoofing attacks. The first …
Who is real bob? adversarial attacks on speaker recognition systems
Speaker recognition (SR) is widely used in our daily life as a biometric authentication or
identification mechanism. The popularity of SR brings in serious security concerns, as …
identification mechanism. The popularity of SR brings in serious security concerns, as …
ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge
An increasing number of independent studies have confirmed the vulnerability of automatic
speaker verification (ASV) technology to spoofing. However, in comparison to that involving …
speaker verification (ASV) technology to spoofing. However, in comparison to that involving …
Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication
Voice biometrics is drawing increasing attention as it is a promising alternative to legacy
passwords for mobile authentication. Recently, a growing body of work shows that voice …
passwords for mobile authentication. Recently, a growing body of work shows that voice …
ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements
The now-acknowledged vulnerabilities of automatic speaker verification (ASV) technology to
spoofing attacks have spawned interests to develop so-called spoofing countermeasures …
spoofing attacks have spawned interests to develop so-called spoofing countermeasures …
ASVspoof: the automatic speaker verification spoofing and countermeasures challenge
Concerns regarding the vulnerability of automatic speaker verification (ASV) technology
against spoofing can undermine confidence in its reliability and form a barrier to exploitation …
against spoofing can undermine confidence in its reliability and form a barrier to exploitation …
[PDF][PDF] Audio Replay Attack Detection Using High-Frequency Features.
This paper presents our contribution to the ASVspoof 2017 Challenge. It addresses a replay
spoofing attack against a speaker recognition system by detecting that the analysed signal …
spoofing attack against a speaker recognition system by detecting that the analysed signal …
Advances in anti-spoofing: from the perspective of ASVspoof challenges
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …
This leads to an increased interest to secure these voice biometric systems for real-world …