Adversarial Transformation of Spoofing Attacks for Voice Biometrics

Add code
Jan 04, 2022
Figure 1 for Adversarial Transformation of Spoofing Attacks for Voice Biometrics
Figure 2 for Adversarial Transformation of Spoofing Attacks for Voice Biometrics
Figure 3 for Adversarial Transformation of Spoofing Attacks for Voice Biometrics
Figure 4 for Adversarial Transformation of Spoofing Attacks for Voice Biometrics

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: