A Deep Identity Representation for Noise Robust Spoofing Detection
暂无分享,去创建一个
Ángel M. Gómez | Antonio M. Peinado | José A. González | Alejandro Gómez Alanís | A. M. Peinado | A. Gómez | A. Alanís
[1] Zhizheng Wu,et al. Deep Feature Engineering for Noise Robust Spoofing Detection , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[2] Aleksandr Sizov,et al. Spoofing detection goes noisy: An analysis of synthetic speech detection in the presence of additive noise , 2016, Speech Commun..
[3] John H. L. Hansen,et al. An Investigation of Deep-Learning Frameworks for Speaker Verification Antispoofing , 2017, IEEE Journal of Selected Topics in Signal Processing.
[4] Douglas A. Reynolds,et al. Speaker identification and verification using Gaussian mixture speaker models , 1995, Speech Commun..
[5] David A. van Leeuwen,et al. Source-normalised-and-weighted LDA for robust speaker recognition using i-vectors , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[6] I. Saratxaga,et al. A cross-vocoder study of speaker independent synthetic speech detection using phase information , 2014, INTERSPEECH.
[7] Qin Jin,et al. Application of LDA to speaker recognition , 2000, INTERSPEECH.
[8] Yoshua Bengio,et al. Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.
[9] Aleksandr Sizov,et al. ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge , 2015, INTERSPEECH.
[10] Hemant A. Patil,et al. Combining evidences from mel cepstral, cochlear filter cepstral and instantaneous frequency features for detection of natural vs. spoofed speech , 2015, INTERSPEECH.
[11] Steve Young,et al. The HTK book version 3.4 , 2006 .
[12] Phil D. Green,et al. Robust automatic speech recognition with missing and unreliable acoustic data , 2001, Speech Commun..
[13] Haizhou Li,et al. Spoofing and countermeasures for speaker verification: A survey , 2015, Speech Commun..
[14] Niko Brümmer,et al. The BOSARIS Toolkit: Theory, Algorithms and Code for Surviving the New DCF , 2013, ArXiv.
[15] Jon Barker,et al. Soft decisions in missing data techniques for robust automatic speech recognition , 2000, INTERSPEECH.
[16] Tomoki Toda,et al. Anti-Spoofing for Text-Independent Speaker Verification: An Initial Database, Comparison of Countermeasures, and Human Performance , 2016, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[17] Nicholas W. D. Evans,et al. A New Feature for Automatic Speaker Verification Anti-Spoofing: Constant Q Cepstral Coefficients , 2016, Odyssey.
[18] Kai Yu,et al. Deep features for automatic spoofing detection , 2016, Speech Communication.
[19] Patrick Kenny,et al. Front-End Factor Analysis for Speaker Verification , 2011, IEEE Transactions on Audio, Speech, and Language Processing.
[20] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[21] Haizhou Li,et al. An Investigation of Spoofing Speech Detection Under Additive Noise and Reverberant Conditions , 2016, INTERSPEECH.
[22] Kong-Aik Lee,et al. The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection , 2017, INTERSPEECH.
[23] Douglas A. Reynolds,et al. Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..