2023
DOI: 10.3390/a16070317
|View full text |Cite
|
Sign up to set email alerts
|

Audio Anti-Spoofing Based on Audio Feature Fusion

Abstract: The rapid development of speech synthesis technology has significantly improved the naturalness and human-likeness of synthetic speech. As the technical barriers for speech synthesis are rapidly lowering, the number of illegal activities such as fraud and extortion is increasing, posing a significant threat to authentication systems, such as automatic speaker verification. This paper proposes an end-to-end speech synthesis detection model based on audio feature fusion in response to the constantly evolving syn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 36 publications
0
1
0
Order By: Relevance
“…In recent years, artificial intelligence methods have been applied in various fields to solve practical problems. In particular, issues such as network resource allocation and base station configuration, which belong to the realm of mathematical optimization theory, can be addressed using deep learning methods [1,2]. The integration of Internet of Things (IoT) technologies plays a significant role in various applications, relying heavily on signal coverage rates and data transmission rates in network communications [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, artificial intelligence methods have been applied in various fields to solve practical problems. In particular, issues such as network resource allocation and base station configuration, which belong to the realm of mathematical optimization theory, can be addressed using deep learning methods [1,2]. The integration of Internet of Things (IoT) technologies plays a significant role in various applications, relying heavily on signal coverage rates and data transmission rates in network communications [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%