Picture for Hector Delgado

Hector Delgado

ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale

Add code
Aug 16, 2024
Figure 1 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 2 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 3 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 4 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Viaarxiv icon

Benchmarking and challenges in security and privacy for voice biometrics

Add code
Sep 01, 2021
Figure 1 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 2 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 3 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 4 for Benchmarking and challenges in security and privacy for voice biometrics
Viaarxiv icon

I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences

Add code
Apr 16, 2019
Figure 1 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 2 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 3 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 4 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Viaarxiv icon

Introduction to Voice Presentation Attack Detection and Recent Advances

Add code
Jan 04, 2019
Figure 1 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 2 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 3 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 4 for Introduction to Voice Presentation Attack Detection and Recent Advances
Viaarxiv icon

t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

Add code
Apr 25, 2018
Figure 1 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 2 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 3 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 4 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Viaarxiv icon