Picture for Zhizheng Wu

Zhizheng Wu

VoxPrivacy: A Benchmark for Evaluating Interactional Privacy of Speech Language Models

Add code
Jan 27, 2026
Viaarxiv icon

Linear Script Representations in Speech Foundation Models Enable Zero-Shot Transliteration

Add code
Jan 06, 2026
Viaarxiv icon

Aliasing-Free Neural Audio Synthesis

Add code
Dec 23, 2025
Figure 1 for Aliasing-Free Neural Audio Synthesis
Figure 2 for Aliasing-Free Neural Audio Synthesis
Figure 3 for Aliasing-Free Neural Audio Synthesis
Figure 4 for Aliasing-Free Neural Audio Synthesis
Viaarxiv icon

SpeechJudge: Towards Human-Level Judgment for Speech Naturalness

Add code
Nov 11, 2025
Figure 1 for SpeechJudge: Towards Human-Level Judgment for Speech Naturalness
Figure 2 for SpeechJudge: Towards Human-Level Judgment for Speech Naturalness
Figure 3 for SpeechJudge: Towards Human-Level Judgment for Speech Naturalness
Figure 4 for SpeechJudge: Towards Human-Level Judgment for Speech Naturalness
Viaarxiv icon

SP-MCQA: Evaluating Intelligibility of TTS Beyond the Word Level

Add code
Oct 30, 2025
Viaarxiv icon

The Singing Voice Conversion Challenge 2025: From Singer Identity Conversion To Singing Style Conversion

Add code
Sep 19, 2025
Viaarxiv icon

AnyAccomp: Generalizable Accompaniment Generation via Quantized Melodic Bottleneck

Add code
Sep 17, 2025
Figure 1 for AnyAccomp: Generalizable Accompaniment Generation via Quantized Melodic Bottleneck
Figure 2 for AnyAccomp: Generalizable Accompaniment Generation via Quantized Melodic Bottleneck
Figure 3 for AnyAccomp: Generalizable Accompaniment Generation via Quantized Melodic Bottleneck
Figure 4 for AnyAccomp: Generalizable Accompaniment Generation via Quantized Melodic Bottleneck
Viaarxiv icon

The CCF AATC 2025: Speech Restoration Challenge

Add code
Sep 16, 2025
Figure 1 for The CCF AATC 2025: Speech Restoration Challenge
Viaarxiv icon

Over-the-Air Adversarial Attack Detection: from Datasets to Defenses

Add code
Sep 11, 2025
Figure 1 for Over-the-Air Adversarial Attack Detection: from Datasets to Defenses
Figure 2 for Over-the-Air Adversarial Attack Detection: from Datasets to Defenses
Figure 3 for Over-the-Air Adversarial Attack Detection: from Datasets to Defenses
Figure 4 for Over-the-Air Adversarial Attack Detection: from Datasets to Defenses
Viaarxiv icon

Audio Deepfake Verification

Add code
Sep 10, 2025
Viaarxiv icon