Presentation attack (spoofing) detection (PAD) typically operates alongs...
This study aims to develop a single integrated spoofing-aware speaker
ve...
We address speaker-aware anti-spoofing, where prior knowledge of the tar...
Speech utterances recorded under differing conditions exhibit varying de...
This paper focuses on multi-enrollment speaker recognition which natural...
Neural network-based speaker recognition has achieved significant improv...
We study a novel neural architecture and its training strategies of spea...
Benchmarking initiatives support the meaningful comparison of competing
...
Deep learning has brought impressive progress in the study of both autom...
The emergence of large-margin softmax cross-entropy losses in training d...
In recent years, latent variable models, such as the Conditional Variati...
The ICASSP 2022 Multi-channel Multi-party Meeting Transcription Grand
Ch...
The time delay neural network (TDNN) represents one of the state-of-the-...
The generation of personalized dialogue is vital to natural and human-li...
Speech enhancement aims to improve the perceptual quality of the speech
...
ASVspoof 2021 is the forth edition in the series of bi-annual challenges...
The automatic speaker verification spoofing and countermeasures (ASVspoo...
For many decades, research in speech technologies has focused upon impro...
This paper proposes the use of two task-aware warping factors in mask-ba...
We present a Bayesian formulation for deep speaker embedding, wherein th...
Conventional approaches to personalized dialogue generation typically re...
This paper proposes a serialized multi-layer multi-head attention for ne...
In far-field speaker verification, the performance of speaker embeddings...
Whether it be for results summarization, or the analysis of classifier
f...
The ASVspoof initiative was conceived to spearhead research in anti-spoo...
This paper presents a simple but effective method that uses multi-resolu...
This paper proposes a generalized framework for domain adaptation of
Pro...
Automatic speaker verification (ASV) vendors and corpus providers would ...
Recent years have seen growing efforts to develop spoofing countermeasur...
Deep speaker embeddings have been demonstrated to outperform their gener...
This document describes task1 of the Short-Duration Speaker Verification...
This paper presents the problems and solutions addressed at the JSALT
wo...
Automatic speaker verification (ASV) is one of the most natural and
conv...
How secure automatic speaker verification (ASV) technology is? More
conc...
Speaker embeddings are continuous-value vector representations that allo...
The I4U consortium was established to facilitate a joint entry to NIST
s...
ASVspoof, now in its third edition, is a series of community-led challen...
Over the past few years significant progress has been made in the field ...
State-of-the-art speaker recognition systems comprise an x-vector (or
i-...
This paper presents an experimental study on deep speaker embedding with...
The ASVspoof challenge series was born to spearhead research in anti-spo...
This article describes the systems jointly submitted by Institute for
In...