Picture for Hector Delgado

Hector Delgado

ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale

Add code
Aug 16, 2024
Viaarxiv icon

Benchmarking and challenges in security and privacy for voice biometrics

Add code
Sep 01, 2021
Figure 1 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 2 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 3 for Benchmarking and challenges in security and privacy for voice biometrics
Figure 4 for Benchmarking and challenges in security and privacy for voice biometrics
Viaarxiv icon

I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences

Add code
Apr 16, 2019
Figure 1 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 2 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 3 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 4 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Viaarxiv icon

Introduction to Voice Presentation Attack Detection and Recent Advances

Add code
Jan 04, 2019
Figure 1 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 2 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 3 for Introduction to Voice Presentation Attack Detection and Recent Advances
Figure 4 for Introduction to Voice Presentation Attack Detection and Recent Advances
Viaarxiv icon

t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

Add code
Apr 25, 2018
Figure 1 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 2 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 3 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Figure 4 for t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
Viaarxiv icon