Picture for Hye-jin Shim

Hye-jin Shim

Text-To-Speech Synthesis In The Wild

Add code
Sep 13, 2024
Viaarxiv icon

ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale

Add code
Aug 16, 2024
Viaarxiv icon

Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing

Add code
Jun 25, 2024
Figure 1 for Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing
Figure 2 for Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing
Figure 3 for Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing
Figure 4 for Beyond Silence: Bias Analysis through Loss and Asymmetric Approach in Audio Anti-Spoofing
Viaarxiv icon

To what extent can ASV systems naturally defend against spoofing attacks?

Add code
Jun 08, 2024
Viaarxiv icon

a-DCF: an architecture agnostic metric with application to spoofing-robust speaker verification

Add code
Mar 03, 2024
Viaarxiv icon

Towards single integrated spoofing-aware speaker verification embeddings

Add code
Jun 01, 2023
Viaarxiv icon

Multi-Dataset Co-Training with Sharpness-Aware Optimization for Audio Anti-spoofing

Add code
Jun 01, 2023
Viaarxiv icon

How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning

Add code
May 31, 2023
Viaarxiv icon

Extended U-Net for Speaker Verification in Noisy Environments

Add code
Jun 27, 2022
Figure 1 for Extended U-Net for Speaker Verification in Noisy Environments
Figure 2 for Extended U-Net for Speaker Verification in Noisy Environments
Figure 3 for Extended U-Net for Speaker Verification in Noisy Environments
Figure 4 for Extended U-Net for Speaker Verification in Noisy Environments
Viaarxiv icon

Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion

Add code
Apr 21, 2022
Figure 1 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 2 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 3 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Figure 4 for Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
Viaarxiv icon