Picture for Jesus Villalba

Jesus Villalba

Clean Label Attacks against SLU Systems

Add code
Sep 13, 2024
Figure 1 for Clean Label Attacks against SLU Systems
Figure 2 for Clean Label Attacks against SLU Systems
Figure 3 for Clean Label Attacks against SLU Systems
Figure 4 for Clean Label Attacks against SLU Systems
Viaarxiv icon

Noise-robust Speech Separation with Fast Generative Correction

Add code
Jun 11, 2024
Viaarxiv icon

DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model

Add code
Jun 18, 2023
Figure 1 for DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model
Figure 2 for DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model
Figure 3 for DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model
Figure 4 for DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model
Viaarxiv icon

Stabilized training of joint energy-based models and their practical applications

Add code
Mar 07, 2023
Viaarxiv icon

Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser

Add code
Apr 08, 2022
Figure 1 for Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Figure 2 for Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Figure 3 for Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Figure 4 for Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser
Viaarxiv icon

AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification

Add code
Apr 08, 2022
Figure 1 for AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Figure 2 for AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Figure 3 for AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Figure 4 for AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Viaarxiv icon

The JHU submission to VoxSRC-21: Track 3

Add code
Sep 28, 2021
Figure 1 for The JHU submission to VoxSRC-21: Track 3
Figure 2 for The JHU submission to VoxSRC-21: Track 3
Viaarxiv icon

Adversarial Attacks and Defenses for Speech Recognition Systems

Add code
Mar 31, 2021
Figure 1 for Adversarial Attacks and Defenses for Speech Recognition Systems
Viaarxiv icon

Learning Speaker Embedding from Text-to-Speech

Add code
Oct 21, 2020
Figure 1 for Learning Speaker Embedding from Text-to-Speech
Figure 2 for Learning Speaker Embedding from Text-to-Speech
Figure 3 for Learning Speaker Embedding from Text-to-Speech
Figure 4 for Learning Speaker Embedding from Text-to-Speech
Viaarxiv icon

x-vectors meet emotions: A study on dependencies between emotion and speaker recognition

Add code
Feb 12, 2020
Figure 1 for x-vectors meet emotions: A study on dependencies between emotion and speaker recognition
Figure 2 for x-vectors meet emotions: A study on dependencies between emotion and speaker recognition
Figure 3 for x-vectors meet emotions: A study on dependencies between emotion and speaker recognition
Figure 4 for x-vectors meet emotions: A study on dependencies between emotion and speaker recognition
Viaarxiv icon