Search
Now showing items 261-270 of 319
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)
In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ...
Modeling the development of infant imitation using inverse reinforcement learning
(IEEE, 2018-09)
Little is known about the computational mechanisms of how imitation skills develop along with infant sensorimotor learning. In robotics, there are several well developed frameworks for imitation learning or so called ...
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
(IEEE, 2012)
Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ...
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)
Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ...
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)
With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ...
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ...
High-performance complex event processing using continuous sliding views
(ACM, 2013)
Complex Event Processing (CEP) has become increasingly important for tracking and monitoring anomalies and trends in event streams emitted from business processes such as supply chain management to online stores in e-commerce. ...
Automatic fall detection for elderly by using features extracted from skeletal data
(IEEE, 2013)
Automatic detection of unusual events such as falls is very important especially for elderly people living alone. Realtime detection of these events can reduce the health risks associated with a fall. In this paper, we ...
The FIRMER-square contour algorithm
(Springer International Publishing, 2013)
The recently proposed Square Contour Algorithm (SCA) provides a good solution to the blind equalization problem as it does not suffer from any type of phase rotation. However, its suitability to Code Division Multiple ...
An introduction to the pocket negotiator: a general purpose negotiation support system
(Springer International Publishing, 2017)
The Pocket Negotiator (PN) is a negotiation support system developed at TU Delft as a tool for supporting people in bilateral negotiations over multi-issue negotiation problems in arbitrary domains. Users are supported in ...
Share this page