Picture for Kong Aik Lee

Kong Aik Lee

ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech

Add code
Feb 13, 2025
Viaarxiv icon

On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection

Add code
Dec 12, 2024
Figure 1 for On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection
Figure 2 for On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection
Figure 3 for On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection
Figure 4 for On the Generation and Removal of Speaker Adversarial Perturbation for Voice-Privacy Protection
Viaarxiv icon

MoMuSE: Momentum Multi-modal Target Speaker Extraction for Real-time Scenarios with Impaired Visual Cues

Add code
Dec 11, 2024
Viaarxiv icon

NTU-NPU System for Voice Privacy 2024 Challenge

Add code
Oct 03, 2024
Figure 1 for NTU-NPU System for Voice Privacy 2024 Challenge
Figure 2 for NTU-NPU System for Voice Privacy 2024 Challenge
Figure 3 for NTU-NPU System for Voice Privacy 2024 Challenge
Figure 4 for NTU-NPU System for Voice Privacy 2024 Challenge
Viaarxiv icon

On the effectiveness of enrollment speech augmentation for Target Speaker Extraction

Add code
Sep 15, 2024
Figure 1 for On the effectiveness of enrollment speech augmentation for Target Speaker Extraction
Figure 2 for On the effectiveness of enrollment speech augmentation for Target Speaker Extraction
Figure 3 for On the effectiveness of enrollment speech augmentation for Target Speaker Extraction
Figure 4 for On the effectiveness of enrollment speech augmentation for Target Speaker Extraction
Viaarxiv icon

Towards Quantifying and Reducing Language Mismatch Effects in Cross-Lingual Speech Anti-Spoofing

Add code
Sep 12, 2024
Viaarxiv icon

NPU-NTU System for Voice Privacy 2024 Challenge

Add code
Sep 06, 2024
Figure 1 for NPU-NTU System for Voice Privacy 2024 Challenge
Figure 2 for NPU-NTU System for Voice Privacy 2024 Challenge
Viaarxiv icon

Malacopula: adversarial automatic speaker verification attacks using a neural-based generalised Hammerstein model

Add code
Aug 17, 2024
Viaarxiv icon

ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale

Add code
Aug 16, 2024
Figure 1 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 2 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 3 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Figure 4 for ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale
Viaarxiv icon

Overview of Speaker Modeling and Its Applications: From the Lens of Deep Speaker Representation Learning

Add code
Jul 21, 2024
Viaarxiv icon