Audio deepfake detection (ADD) is the task of detecting spoofing attacks...
Background noise considerably reduces the accuracy and reliability of sp...
Background noise reduces speech intelligibility and quality, making spea...
The application of speech self-supervised learning (SSL) models has achi...
Recently, numerous studies have been conducted on supervised learning-ba...
The advent of hyper-scale and general-purpose pre-trained models is shif...
In music, short-term features such as pitch and tempo constitute long-te...
Background noise is a well-known factor that deteriorates the accuracy a...
Deep learning has brought impressive progress in the study of both autom...
ASV (automatic speaker verification) systems are intrinsically required ...
The objective of this paper is to combine multiple frame-level features ...
Artefacts that differentiate spoofed from bona-fide utterances can resid...
The attention mechanism has been widely adopted in acoustic scene
classi...
Most speaker verification tasks are studied as an open-set evaluation
sc...
This work presents a novel back-end framework for speaker verification u...
Frequently misclassified pairs of classes that share many common acousti...
A number of studies have successfully developed speaker verification or
...
Most studies on speaker verification systems focus on long-duration
utte...
Most studies on speaker verification systems focus on long-duration
utte...
Recent advances in deep learning have facilitated the design of speaker
...
Recent advances in deep learning have facilitated the design of speaker
...
In this study, we analyze the role of various categories of subsidiary
i...
Large datasets are well-known as a key to the recent advances in deep
le...
An adversarial process between two deep neural networks is a promising
a...
Acoustic scene classification identifies an input segment into one of th...
In this study, we concentrate on replacing the process of extracting
han...
Recently, direct modeling of raw waveforms using deep neural networks ha...
In recent years, speaker verification has been primarily performed using...
Input utterance with short duration is one of the most critical threats ...
In this paper, we propose a replay attack spoofing detection system for
...