Picture for Ville Vestman

Ville Vestman

ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech

Add code
Feb 11, 2021
Figure 1 for ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
Figure 2 for ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
Figure 3 for ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
Figure 4 for ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
Viaarxiv icon

Extrapolating false alarm rates in automatic speaker verification

Add code
Aug 08, 2020
Figure 1 for Extrapolating false alarm rates in automatic speaker verification
Figure 2 for Extrapolating false alarm rates in automatic speaker verification
Viaarxiv icon

UIAI System for Short-Duration Speaker Verification Challenge 2020

Add code
Jul 26, 2020
Figure 1 for UIAI System for Short-Duration Speaker Verification Challenge 2020
Figure 2 for UIAI System for Short-Duration Speaker Verification Challenge 2020
Figure 3 for UIAI System for Short-Duration Speaker Verification Challenge 2020
Figure 4 for UIAI System for Short-Duration Speaker Verification Challenge 2020
Viaarxiv icon

Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals

Add code
Jul 12, 2020
Figure 1 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 2 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 3 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Figure 4 for Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
Viaarxiv icon

Neural i-vectors

Add code
Apr 18, 2020
Figure 1 for Neural i-vectors
Figure 2 for Neural i-vectors
Figure 3 for Neural i-vectors
Figure 4 for Neural i-vectors
Viaarxiv icon

Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores

Add code
Nov 04, 2019
Figure 1 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 2 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 3 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 4 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Viaarxiv icon

Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration

Add code
Jun 20, 2019
Figure 1 for Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration
Figure 2 for Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration
Figure 3 for Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration
Viaarxiv icon

Voice Mimicry Attacks Assisted by Automatic Speaker Verification

Add code
Jun 03, 2019
Figure 1 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 2 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 3 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Figure 4 for Voice Mimicry Attacks Assisted by Automatic Speaker Verification
Viaarxiv icon

I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences

Add code
Apr 16, 2019
Figure 1 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 2 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 3 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Figure 4 for I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
Viaarxiv icon

Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection

Add code
Nov 09, 2018
Figure 1 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 2 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 3 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Figure 4 for Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
Viaarxiv icon