Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Audio deepfake detection: A survey
Audio deepfake detection is an emerging active topic. A growing number of literatures have
aimed to study deepfake detection algorithms and achieved effective performance, the …
aimed to study deepfake detection algorithms and achieved effective performance, the …
Speaker recognition by machines and humans: A tutorial review
Identifying a person by his or her voice is an important human trait most take for granted in
natural human-to-human interaction/communication. Speaking to someone over the …
natural human-to-human interaction/communication. Speaking to someone over the …
Trends in audio signal feature extraction methods
Audio signal processing algorithms generally involves analysis of signal, extracting its
properties, predicting its behaviour, recognizing if any pattern is present in the signal, and …
properties, predicting its behaviour, recognizing if any pattern is present in the signal, and …
[PDF][PDF] Generalization of Audio Deepfake Detection.
Audio Deepfakes, technically known as logical-access voice spoofing techniques, have
become an increased threat on voice interfaces due to the recent breakthroughs in speech …
become an increased threat on voice interfaces due to the recent breakthroughs in speech …
Replay and synthetic speech detection with res2net architecture
Existing approaches for replay and synthetic speech detection still lack generalizability to
unseen spoofing attacks. This work proposes to leverage a novel model structure, so-called …
unseen spoofing attacks. This work proposes to leverage a novel model structure, so-called …
ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge
An increasing number of independent studies have confirmed the vulnerability of automatic
speaker verification (ASV) technology to spoofing. However, in comparison to that involving …
speaker verification (ASV) technology to spoofing. However, in comparison to that involving …
Spoofing and countermeasures for speaker verification: A survey
While biometric authentication has advanced significantly in recent years, evidence shows
the technology can be susceptible to malicious spoofing attacks. The research community …
the technology can be susceptible to malicious spoofing attacks. The research community …
A comparison of features for synthetic speech detection
The performance of biometric systems based on automatic speaker recognition technology
is severely degraded due to spoofing attacks with synthetic speech generated using different …
is severely degraded due to spoofing attacks with synthetic speech generated using different …
A survey on voice assistant security: Attacks and countermeasures
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …
smartphones and smart speakers. As companies build voice assistants with extra …
ASSERT: Anti-spoofing with squeeze-excitation and residual networks
We present JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with
Squeeze-Excitation and Residual neTworks (ASSERT). Anti-spoofing has gathered more …
Squeeze-Excitation and Residual neTworks (ASSERT). Anti-spoofing has gathered more …