Browsing Computer Science by Subject "Security of data"
Now showing items 1-2 of 2
-
SAS : A speaker verification spoofing database containing diverse attacks
(IEEE, 2015)This paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice ... -
TIDY: A trust-based approach to information fusion through diversity
(IEEE, 2013)Trust and reputation are significant components in open dynamic systems for making informed and reliable decisions. State-of-the-art information fusion models that exploit these mechanisms generally rely on reports from ...
Share this page