Picture for Khalid Mahmood Malik

Khalid Mahmood Malik

Transferable Adversarial Attacks on Audio Deepfake Detection

Add code
Jan 21, 2025
Figure 1 for Transferable Adversarial Attacks on Audio Deepfake Detection
Figure 2 for Transferable Adversarial Attacks on Audio Deepfake Detection
Figure 3 for Transferable Adversarial Attacks on Audio Deepfake Detection
Figure 4 for Transferable Adversarial Attacks on Audio Deepfake Detection
Viaarxiv icon

A Lightweight and Interpretable Deepfakes Detection Framework

Add code
Jan 21, 2025
Viaarxiv icon

Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures

Add code
Dec 07, 2024
Figure 1 for Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures
Figure 2 for Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures
Figure 3 for Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures
Figure 4 for Securing Social Media Against Deepfakes using Identity, Behavioral, and Geometric Signatures
Viaarxiv icon

Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices

Add code
Nov 29, 2024
Figure 1 for Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices
Figure 2 for Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices
Figure 3 for Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices
Figure 4 for Parallel Stacked Aggregated Network for Voice Authentication in IoT-Enabled Smart Devices
Viaarxiv icon

Securing Voice Biometrics: One-Shot Learning Approach for Audio Deepfake Detection

Add code
Oct 05, 2023
Viaarxiv icon

Bridging the Spoof Gap: A Unified Parallel Aggregation Network for Voice Presentation Attacks

Add code
Sep 19, 2023
Viaarxiv icon

Frame-to-Utterance Convergence: A Spectra-Temporal Approach for Unified Spoofing Detection

Add code
Sep 18, 2023
Viaarxiv icon

Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward

Add code
Oct 02, 2022
Figure 1 for Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward
Figure 2 for Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward
Figure 3 for Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward
Figure 4 for Voice Spoofing Countermeasures: Taxonomy, State-of-the-art, experimental analysis of generalizability, open challenges, and the way forward
Viaarxiv icon

Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward

Add code
Feb 25, 2021
Figure 1 for Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward
Figure 2 for Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward
Figure 3 for Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward
Figure 4 for Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward
Viaarxiv icon