Picture for Thomas Thebaud

Thomas Thebaud

LIUM

Clean Label Attacks against SLU Systems

Add code
Sep 13, 2024
Figure 1 for Clean Label Attacks against SLU Systems
Figure 2 for Clean Label Attacks against SLU Systems
Figure 3 for Clean Label Attacks against SLU Systems
Figure 4 for Clean Label Attacks against SLU Systems
Viaarxiv icon

Supervised and Unsupervised Alignments for Spoofing Behavioral Biometrics

Add code
Aug 14, 2024
Viaarxiv icon

Noise-robust Speech Separation with Fast Generative Correction

Add code
Jun 11, 2024
Viaarxiv icon

Unraveling Adversarial Examples against Speaker Identification -- Techniques for Attack Detection and Victim Model Classification

Add code
Feb 29, 2024
Viaarxiv icon

Leveraging Pretrained Image-text Models for Improving Audio-Visual Learning

Add code
Sep 08, 2023
Figure 1 for Leveraging Pretrained Image-text Models for Improving Audio-Visual Learning
Figure 2 for Leveraging Pretrained Image-text Models for Improving Audio-Visual Learning
Figure 3 for Leveraging Pretrained Image-text Models for Improving Audio-Visual Learning
Figure 4 for Leveraging Pretrained Image-text Models for Improving Audio-Visual Learning
Viaarxiv icon

DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model

Add code
Jun 18, 2023
Figure 1 for DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model
Figure 2 for DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model
Figure 3 for DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model
Figure 4 for DuTa-VC: A Duration-aware Typical-to-atypical Voice Conversion Approach with Diffusion Probabilistic Model
Viaarxiv icon

Self-FiLM: Conditioning GANs with self-supervised representations for bandwidth extension based speaker recognition

Add code
Mar 07, 2023
Viaarxiv icon

On the invertibility of a voice privacy system using embedding alignement

Add code
Oct 08, 2021
Figure 1 for On the invertibility of a voice privacy system using embedding alignement
Figure 2 for On the invertibility of a voice privacy system using embedding alignement
Figure 3 for On the invertibility of a voice privacy system using embedding alignement
Figure 4 for On the invertibility of a voice privacy system using embedding alignement
Viaarxiv icon