Browsing Computer Science by Author "(ORCID 0000-0002-6160-3169 & YÖK ID 144947) Demiroğlu, Cenk"
Now showing items 21-33 of 33
-
OCR-aided person annotation and label propagation for speaker modeling in TV shows
Budnik, M.; Besacier, L.; Khodabakhsh, Ali; Demiroğlu, Cenk (IEEE, 2016)In this paper, we present an approach for minimizing human effort in manual speaker annotation. Label propagation is used at each iteration of an active learning cycle. More precisely, a selection strategy for choosing the ... -
ÖZÜ konuşmacı doğrulama sisteminin çok sınıflı senaryoda NIST 2010 veritabanı ile başarımı
Yeşil, Fatih; Demiroğlu, Cenk (IEEE, 2011)Performance of the speaker verification systems is typically measured based on their binary decision accuracy. However, in speaker verification applications where close to %100 accuracy is required, such as the systems ... -
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
Yeşil, Fatih; Demiroğlu, Cenk (IEEE, 2012)Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ... -
Postprocessing synthetic speech with a complex cepstrum vocoder for spoofing phase-based synthetic speech detectors
Demiroğlu, Cenk; Buyuk, O.; Khodabakhsh, Ali; Maia, R. (IEEE, 2017-06)State-of-the-art speaker verification systems are vulnerable to spoofing attacks. To address the issue, high-performance synthetic speech detectors (SSDs) for existing spoofing methods have been proposed. Phase-based SSDs ... -
SAS : A speaker verification spoofing database containing diverse attacks
Wu, Z.; Khodabakhsh, Ali; Demiroğlu, Cenk; Yamagishi, J.; Saito, D.; Toda, T.; King, S. (IEEE, 2015)This paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice ... -
Sesli̇ yanıt si̇stemi̇ çaǧrı akışında di̇lbi̇lgi̇si̇ tabanlı Türkçe konuşma tanıma si̇stemi̇ tanıtımı
Karagöz, Gün; Demiroğlu, Cenk (IEEE, 2012)Bu bildiride, çağrı merkezleri için kullanılan sesli yanıt sisteminde dilbilgisi-tabanlı Türkçe konuşma tanıma sistemi anlatılmaktadır. Yapılan çalışmada bir telekomünikasyon kurumunun çağrı merkezi sisteminin örneklemesi ... -
A small footprint hybrid statistical and unit selection text-to-speech synthesis system for Turkish
Güner, Ekrem; Demiroğlu, Cenk (Springer Science+Business Media, 2012)Unit selection based text-to-speech synthesis (TTS) can generate high quality speech. However, The HMM-based text-to-speech (HTS) has also advantages such as the lack of spurious errors that are observed in the unit selection ... -
A small footprint hybrid statistical/unit selection text-to-speech synthesis system for agglutinative languages
Güner, Ekrem; Demiroğlu, Cenk (IEEE, 2012)Despite its success, unit selection based text-to-speech synthesis (TTS) has has some disadvantages such as sudden discontinuities in speech that distract the listeners. The HMM-based TTS (HTS) approach has been increasingly ... -
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
Özbay, Mustafa Caner; Khodabakhsh, Ali; Mohammadi, Amir; Demiroğlu, Cenk (IEEE, 2016)Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ... -
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
Khodabakhsh, Ali; Mohammadi, Amir; Demiroğlu, Cenk (Elsevier, 2017-03)State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ... -
Uncertainty assessment for detection of spoofing attacks to speaker verification systems using a Bayesian approach
Süslü, Çağıl; Eren, Eray; Demiroğlu, Cenk (Elsevier, 2022-02)There has been tremendous progress in automatic speaker verification systems over the last decade. Still, spoofing attacks pose a significant challenge to their deployment. Even though there are various attack techniques ... -
Using eigenvoices and nearest-neighbors in HMM-based cross-lingual speaker adaptation with limited data
Sarfjoo, Seyyed Saeed; Demiroğlu, Cenk; King, S. (IEEE, 2017-04)Cross-lingual speaker adaptation for speech synthesis has many applications, such as use in speech-to-speech translation systems. Here, we focus on cross-lingual adaptation for statistical speech synthesis systems using ... -
Vurgu ve söyleyiş modelleme hatalarının SMM tabanlı Türkçe MKS sistemindeki etkileri
Güner, Ekrem; Demiroğlu, Cenk (IEEE, 2011)SMM tabanlı metinden konuşma sentezleme (SMM-MKS) yöntemi, gün geçtikçe daha 1 fazla araştırmacısının ilgisini çekmektedir. Bu yöntemin en önemli avantajlarından biri, birim seçmeli sistemlerde görülen bozulma etkilerinin ...
Share this page