2019
DOI: 10.48550/arxiv.1904.01120
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

ASSERT: Anti-Spoofing with Squeeze-Excitation and Residual neTworks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 27 publications
0
18
0
Order By: Relevance
“…System #1 refers to the proposed architecture that jointly optimizes SID, PAD, and ISV loss, Figure 1-(a). System #2-SE is the result of applying squeezeexcitation (SE) [26] based on its recent application to PAD [9]. System #3 describes the result of assigning three max feature map (MFM) blocks [21] for SID as well as for PAD after the first three MFM blocks.…”
Section: Results Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…System #1 refers to the proposed architecture that jointly optimizes SID, PAD, and ISV loss, Figure 1-(a). System #2-SE is the result of applying squeezeexcitation (SE) [26] based on its recent application to PAD [9]. System #3 describes the result of assigning three max feature map (MFM) blocks [21] for SID as well as for PAD after the first three MFM blocks.…”
Section: Results Analysismentioning
confidence: 99%
“…However, SV systems are known to be vulnerable to spoofing attacks such as replay attacks, voice conversion, and speech synthesis. These vulnerabilities have inspired research into presentation attack detection (PAD), which classifies given utterances as spoofed or not spoofed [6][7][8]; notably, many DNN-based systems have achieved promising results [9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…We follow the pre-training settings as in [66], where we pre-train our Mockingjay model on 360 hours of speech on the LibriSpeech dataset [72]. Two highperformance anti-spoofing models are adopted: LCNN [55] and SENet [56]. The implementation details of the two models can be found in [62].…”
Section: Experiments Setupmentioning
confidence: 99%
“…Spoofing countermeasure models, also known as anti-spoofing models, are shields for ASV to detect and filter spoofing audio. Recently several high performance antispoofing models have been proposed [47][48][49][50][51][52][53][54][55][56].…”
Section: Introductionmentioning
confidence: 99%
“…Some methods also use raw signals to extract features using methods such as SincNet [18] or Variational Auto Encoder (VAE) [19]. The second category deals with a variety of classifiers such as Neural networkbased methods including VGG [18], Squeeze-Excitation (SE), Residual network, Siamese networks [20], and recurrent networks [21], as well as other traditional GMM-based methods. Certain methods have also used end-to-end structures for this purpose.…”
Section: Introductionmentioning
confidence: 99%