Presentation attack (spoofing) detection (PAD) typically operates alongs...
A reliable deepfake detector or spoofing countermeasure (CM) should be r...
The success of deep learning in speaker recognition relies heavily on th...
This study investigates the impact of gender information on utility, pri...
For the most popular x-vector-based approaches to speaker anonymisation,...
We present Malafide, a universal adversarial attack against automatic sp...
This study aims to develop a single integrated spoofing-aware speaker
ve...
Spoof localization, also called segment-level detection, is a crucial ta...
Biometric data contains distinctive human traits such as facial features...
Benchmarking initiatives support the meaningful comparison of competing
...
The VoicePrivacy Challenge aims to promote the development of privacy
pr...
Deep learning has brought impressive progress in the study of both autom...
Automatic speaker verification is susceptible to various manipulations a...
For new participants - Executive summary: (1) The task is to develop a v...
Despite several years of research in deepfake and spoofing detection for...
The performance of spoofing countermeasure systems depends fundamentally...
ASV (automatic speaker verification) systems are intrinsically required ...
This paper introduces RawBoost, a data boosting and augmentation method ...
Artefacts that differentiate spoofed from bona-fide utterances can resid...
This paper presents the results and analyses stemming from the first
Voi...
ASVspoof 2021 is the forth edition in the series of bi-annual challenges...
The automatic speaker verification spoofing and countermeasures (ASVspoo...
For many decades, research in speech technologies has focused upon impro...
Artefacts that serve to distinguish bona fide speech from spoofed or dee...
Whether it be for results summarization, or the analysis of classifier
f...
The COVID-19 pandemic has led to the saturation of public health service...
The cues needed to detect spoofing attacks against automatic speaker
ver...
This paper reports the first successful application of a differentiable
...
All existing databases of spoofed speech contain attack data that is spo...
Since early 2020 the COVID-19 pandemic has had a considerable impact on ...
The ASVspoof initiative was conceived to spearhead research in anti-spoo...
Nen verbal morphology is remarkably complex; a transitive verb can take ...
Anonymisation has the goal of manipulating speech signals in order to de...
Biometric systems are nowadays employed across a broad range of applicat...
The proliferation of speech technologies and rising privacy legislation ...
Recent years have seen growing efforts to develop spoofing countermeasur...
The threat of spoofing can pose a risk to the reliability of automatic
s...
Mounting privacy legislation calls for the preservation of privacy in sp...
The VoicePrivacy initiative aims to promote the development of privacy
p...
Existing learning-based methods to automatically trace axons in 3D brain...
Anti-spoofing for automatic speaker verification is now a well establish...
This paper describes the speaker diarization systems developed for the S...
Automatic speaker verification (ASV) is one of the most natural and
conv...
Privacy preservation and the protection of speech data is in high demand...
In many voice biometrics applications there is a requirement to preserve...
The social media revolution has produced a plethora of web services to w...
The I4U consortium was established to facilitate a joint entry to NIST
s...
ASVspoof, now in its third edition, is a series of community-led challen...
Over the past few years significant progress has been made in the field ...
The ASVspoof challenge series was born to spearhead research in anti-spo...