Abstract | ||
---|---|---|
Concerns regarding the vulnerability of automatic speaker verification (ASV) technology against spoofing can undermine confidence in its reliability and form a barrier to exploitation. The absence of competitive evaluations and the lack of common datasets has hampered progress in developing effective spoofing countermeasures. This paper describes the ASV Spoofing and Countermeasures (ASVspoof) ini... |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/JSTSP.2017.2671435 | IEEE Journal of Selected Topics in Signal Processing |
Keywords | Field | DocType |
Speech,Signal processing algorithms,Vocoders,Databases,Protocols,Speech synthesis,Data visualization | Speaker verification,Spoofing attack,Computer science,Computer security,Risk analysis (engineering),Artificial intelligence,Vulnerability,Countermeasure,Computer vision,Speech synthesis,Data visualization,Technological change,Biometrics | Journal |
Volume | Issue | ISSN |
11 | 4 | 1932-4553 |
Citations | PageRank | References |
13 | 0.72 | 54 |
Authors | ||
8 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zhizheng Wu | 1 | 565 | 35.23 |
junichi yamagishi | 2 | 1906 | 145.51 |
Tomi Kinnunen | 3 | 1323 | 86.67 |
Cemal Hanilçi | 4 | 171 | 11.23 |
Md. Sahidullah | 5 | 326 | 24.99 |
Aleksandr Sizov | 6 | 96 | 4.54 |
nicholas evans | 7 | 594 | 54.41 |
Massimiliano Todisco | 8 | 138 | 17.80 |