Picture for Rosa González Hautamäki

Rosa González Hautamäki

How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning

Add code
May 31, 2023
Viaarxiv icon

Improving speaker de-identification with functional data analysis of f0 trajectories

Add code
Mar 31, 2022
Figure 1 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 2 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 3 for Improving speaker de-identification with functional data analysis of f0 trajectories
Figure 4 for Improving speaker de-identification with functional data analysis of f0 trajectories
Viaarxiv icon

Data Quality as Predictor of Voice Anti-Spoofing Generalization

Add code
Mar 26, 2021
Figure 1 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 2 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 3 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Figure 4 for Data Quality as Predictor of Voice Anti-Spoofing Generalization
Viaarxiv icon

Voice Mimicry Attacks Assisted by Automatic Speaker Verification

Add code
Jun 03, 2019
Figure 1 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 2 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 3 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 4 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Viaarxiv icon

Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection

Add code
Nov 09, 2018
Figure 1 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 2 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 3 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 4 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Viaarxiv icon