In this work, we propose a zero-shot voice conversion method using speec...
Steganography and digital watermarking are the tasks of hiding recoverab...
Deep neural network based face recognition models have been shown to be
...
Deepfakes and manipulated media are becoming a prominent threat due to t...
Self-supervised learning methods such as wav2vec 2.0 have shown promisin...
There has been a recent surge in adversarial attacks on deep learning ba...
With the abundance of large-scale deep learning models, it has become
po...
Voice cloning is the task of learning to synthesize the voice of an unse...
Autoregressive convolutional neural networks (CNNs) have been widely
exp...
In this work, we demonstrate the existence of universal adversarial audi...
Adversarial Reprogramming has demonstrated success in utilizing pre-trai...