Residual Networks for Resisting Noise: Analysis of an Embeddings-based Spoofing Countermeasure
暂无分享,去创建一个
Finnian Kelly | Anil Alexander | Rob van Son | Bence Halpern | Finnian Kelly | A. Alexander | B. Halpern | R. V. Son
[1] Yu Tsao,et al. MOSNet: Deep Learning based Objective Assessment for Voice Conversion , 2019, INTERSPEECH.
[2] Geoffrey E. Hinton,et al. Visualizing Data using t-SNE , 2008 .
[3] Thomas A. Funkhouser,et al. Dilated Residual Networks , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[4] Haizhou Li,et al. Spoofing detection under noisy conditions: a preliminary investigation and an initial database , 2016, ArXiv.
[5] Christian S. Perone,et al. Spinal cord gray matter segmentation using deep dilated convolutions , 2017, Scientific Reports.
[6] Galina Lavrentyeva,et al. STC Antispoofing Systems for the ASVspoof2019 Challenge , 2019, INTERSPEECH.
[7] Tomi Kinnunen,et al. ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection , 2019, INTERSPEECH.
[8] Nanxin Chen,et al. ASSERT: Anti-Spoofing with Squeeze-Excitation and Residual neTworks , 2019, INTERSPEECH.
[9] Lauri Juvela,et al. The ASVspoof 2019 database , 2019, ArXiv.
[10] Heiga Zen,et al. WaveNet: A Generative Model for Raw Audio , 2016, SSW.
[11] Aleksandr Sizov,et al. Spoofing detection goes noisy: An analysis of synthetic speech detection in the presence of additive noise , 2016, Speech Commun..
[12] Sanjeev Khudanpur,et al. X-Vectors: Robust DNN Embeddings for Speaker Recognition , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[13] Jae S. Lim,et al. Signal estimation from modified short-time Fourier transform , 1983, ICASSP.
[14] Daniel Povey,et al. MUSAN: A Music, Speech, and Noise Corpus , 2015, ArXiv.
[15] Sébastien Marcel,et al. End-to-End convolutional neural network-based voice presentation attack detection , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[16] Christian Schörkhuber. CONSTANT-Q TRANSFORM TOOLBOX FOR MUSIC PROCESSING , 2010 .
[17] Kong-Aik Lee,et al. t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification , 2018, Odyssey.
[18] Abhishek Das,et al. Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).
[19] Nicholas W. D. Evans,et al. A New Feature for Automatic Speaker Verification Anti-Spoofing: Constant Q Cepstral Coefficients , 2016, Odyssey.
[20] Ming Li,et al. The DKU Replay Detection System for the ASVspoof 2019 Challenge: On Data Augmentation, Feature Representation, Classification, and Fusion , 2019, INTERSPEECH.
[21] Jun Guo,et al. Effect of multi-condition training and speech enhancement methods on spoofing detection , 2016, 2016 First International Workshop on Sensing, Processing and Learning for Intelligent Machines (SPLINE).