FAKEBOB-adversarial-attack / FAKEBOBView external linksLinks
Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)
☆105Nov 18, 2022Updated 3 years ago
Alternatives and similar repositories for FAKEBOB
Users that are interested in FAKEBOB are comparing it to the libraries listed below
Sorting:
- Adversarial attack and defense strategies for deep speaker recognition systems☆42Feb 18, 2021Updated 4 years ago
- This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".☆42Mar 9, 2023Updated 2 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆35Mar 9, 2020Updated 5 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- code for paper "learning to fool the speaker recognition"☆10Jun 12, 2020Updated 5 years ago
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆12Sep 4, 2021Updated 4 years ago
- Adversarial Attacks☆59Mar 22, 2019Updated 6 years ago
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆310Jul 24, 2022Updated 3 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆70Aug 27, 2020Updated 5 years ago
- A speaker recognition system which uses GMM-UBM for use in an Android application which helps in monitoring patients suffering from Schiz…☆55Jun 13, 2018Updated 7 years ago
- Robust Audio Adversarial Example for a Physical Attack☆63Nov 13, 2019Updated 6 years ago
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- Dual-Adversarial Domain Adaptation for replay spoofing detection in automatic speaker verification.☆19Oct 28, 2025Updated 3 months ago
- Pytorch implementation of Backdoor Attack against Speaker Verification☆28Sep 19, 2023Updated 2 years ago
- Generation tool for offset-resistant audio adversarial examples against Deepspeech☆10Oct 5, 2020Updated 5 years ago
- Adversarial Attacks☆21Oct 11, 2021Updated 4 years ago
- ICASSP 2021 accepted paper☆20May 20, 2021Updated 4 years ago
- Similarity Learning applied to Speaker Verification and Semantic Textual Similarity☆12Apr 8, 2020Updated 5 years ago
- Prosody Predict☆10Jan 4, 2021Updated 5 years ago
- Attacking Speaker Recognition with Deep Generative Models☆34Mar 24, 2023Updated 2 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- Data split we use during the ASVspoof 2019 challenge☆16Nov 28, 2019Updated 6 years ago
- Our submission to the ASVspoof 2019: Automatic Speaker Verification Spoofing and Countermeasures Challenge☆102Feb 20, 2020Updated 5 years ago
- Spoofing Speaker Verification Systems with Multi-speaker Text-to-speech Synthesis☆11Jun 21, 2022Updated 3 years ago
- An adversarial example library for constructing attacks, building defenses, and benchmarking both☆28Nov 12, 2019Updated 6 years ago
- ☆23Jun 28, 2019Updated 6 years ago
- Deep speaker embeddings in PyTorch, including x-vectors. Code used in this work: https://arxiv.org/abs/2007.16196☆320Nov 11, 2020Updated 5 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆11Sep 28, 2020Updated 5 years ago
- JHU's system submission to the ASVspoof 2019 Challenge: Anti-Spoofing with Squeeze-Excitation and Residual neTworks (ASSERT).☆57Jan 20, 2023Updated 3 years ago
- Reproduction of paper Void: A Fast and Light Voice Liveness Detection System☆19Aug 19, 2020Updated 5 years ago
- ☆88Feb 6, 2021Updated 5 years ago
- [ICSE-SEIP'21] Robustness of on-device Models: AdversarialAttack to Deep Learning Models on Android Apps☆16Jun 2, 2022Updated 3 years ago
- Voice Activity Detection System☆21Jun 9, 2015Updated 10 years ago
- MTGAN: Speaker Verification through Multitasking Triplet Generative Adversarial Networks☆19Feb 29, 2020Updated 5 years ago
- Implementation of Neural PLDA (NPLDA) model (A discriminative backend for Speaker Verification)☆100Apr 20, 2020Updated 5 years ago
- An Open Source Tools for Speaker Recognition☆634Aug 5, 2024Updated last year
- Implementation of a standard synthetic speech detection approach via bob.bio.spear Python package☆16Mar 23, 2017Updated 8 years ago