Search
Now showing items 1-3 of 3
Uncertainty assessment for detection of spoofing attacks to speaker verification systems using a Bayesian approach
(Elsevier, 2022-02)
There has been tremendous progress in automatic speaker verification systems over the last decade. Still, spoofing attacks pose a significant challenge to their deployment. Even though there are various attack techniques ...
NatiQ: An end-to-end text-to-speech system for arabic
(Association for Computational Linguistics (ACL), 2022)
NatiQ is end-to-end text-to-speech system for Arabic. Our speech synthesizer uses an encoder-decoder architecture with attention. We used both tacotron-based models (tacotron-1 and tacotron-2) and the faster transformer ...
Disentangling human trafficking types and the identification of pathways to forced labor and sex: an explainable analytics approach
(Springer, 2023-07)
Terms such as human trafficking and modern-day slavery are ephemeral but reflect manifestations of oppression, servitude, and captivity that perpetually have threatened the basic right of all humans. Operations research ...
Share this page