This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations] accepted in The Speaker and Language Recognition Workshop (Speaker Odyssey 2022).
☆12Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for shap-anti-spoofing
Users that are interested in shap-anti-spoofing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 15, 2025Updated 10 months ago
- This repository includes the code to reproduce our paper "Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detecti…☆11Jul 11, 2023Updated 2 years ago
- **ICASSP 2022** 《Toward Degradation-Robust Voice Conversion》Using speech enhancement and end-to-end denoising training to improve degrada…☆24Sep 27, 2022Updated 3 years ago
- This repository includes the code to reproduce our paper Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing…☆18Apr 30, 2022Updated 3 years ago
- A study of the downstream instability of word embeddings☆12Aug 23, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Project for HIDING SPEAKER’S SEX IN SPEECH USING ZERO-EVIDENCE SPEAKER REPRESENTATION IN AN ANALYSIS/SYNTHESIS PIPELINE☆15Nov 30, 2022Updated 3 years ago
- ☆10Feb 22, 2022Updated 4 years ago
- Language independent SSL-based Speaker Anonymization system☆19May 28, 2024Updated last year
- ☆19Apr 28, 2023Updated 2 years ago
- Baseline for the Spoofing-aware Speaker Verification Challenge 2022☆66May 3, 2022Updated 3 years ago
- 基于PC-DDSP和nsf-HiFiGAN的声码器☆18Jul 17, 2023Updated 2 years ago
- The official repo/implementation of the paper "Training a Singing Transcription Model Using Connectionist Temporal Classification Loss an…☆12Mar 25, 2025Updated last year
- Adversarial Augmentation Against Adversarial Attacks☆32May 23, 2023Updated 2 years ago
- Dynamic vision-guided speaker embedding for audio-visual speaker diarization☆12Jul 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A robust pitch tracker using synchro-squeezed fft and frequency domain autocorrelation☆36Jan 17, 2024Updated 2 years ago
- Mainly on text documents. Implemented a Mini Search Engine using different algorithms and then summaried documents using lexrank.☆11Jan 19, 2018Updated 8 years ago
- Code accompanying the 2022 DLS paper "Misleading Deep-Fake Detection with GAN Fingerprints"☆10May 26, 2022Updated 3 years ago
- Speaker embedding for VI-SVC and VI-SVS, alse for VITS; Use this to replace the ID to implement voice clone.☆30Sep 16, 2022Updated 3 years ago
- Code for paper: "RemovalNet: DNN model fingerprinting removal attack", IEEE TDSC 2023.☆10Nov 27, 2023Updated 2 years ago
- Implementation of Attack Agnostic Dataset: Towards Generalization and Stabilization of Audio DeepFake Detection paper☆61Aug 15, 2023Updated 2 years ago
- Codebase for information theoretic shapley values to explain predictive uncertainty.This repo contains the code related to the paperWatso…☆22Jul 4, 2024Updated last year
- AdvSV stands as the first dataset developed specifically for evaluating Speaker Verification (SV) systems against adversarial attacks. I…☆11Nov 21, 2023Updated 2 years ago
- ☆17Aug 30, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Pytorch implementation for “V2C: Visual Voice Cloning”☆34Jan 28, 2023Updated 3 years ago
- Official implementation of our ASVspoof 2021 paper, "UR Channel-Robust Synthetic Speech Detection System for ASVspoof 2021"☆55Feb 15, 2022Updated 4 years ago
- Implementation of "Defense against Adversarial Attacks on Audio DeepFake Detection"☆60Oct 20, 2023Updated 2 years ago
- Adversarial attack and defense strategies for deep speaker recognition systems☆41Feb 18, 2021Updated 5 years ago
- Self-Supervised Speech/Sound Pre-training and Representation Learning Toolkit☆13Nov 18, 2022Updated 3 years ago
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Deepfake cross-lingual evaluation dataset (DECRO) is constructed to evaluate the influence of language differences on deepfake detection.…☆16Sep 14, 2023Updated 2 years ago
- ☆12Nov 30, 2021Updated 4 years ago
- Tensorflow Audio Classification Models☆13Jul 21, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This repository contains the code for all figures in the paper "General Pitfalls of Model-agnostic Interpretation Methods for Machine Lea…☆15Aug 17, 2021Updated 4 years ago
- [InterSpeech 2020] "Improving the Speaker Identity of Non-Parallel Many-to-Many VoiceConversion with Adversarial Speaker Recognition" by …☆39Mar 24, 2023Updated 3 years ago
- Research code for the paper "Training speaker recognition systems with limited data" at https://arxiv.org/abs/2203.14688☆13Dec 2, 2024Updated last year
- ☆15Jul 11, 2022Updated 3 years ago
- Code for the paper "Transcribing Human Piano Performances into Music Notation" accepted at ISMIR 2016☆17Jan 24, 2018Updated 8 years ago
- ☆11Oct 13, 2022Updated 3 years ago
- Crawl & visualize ICLR papers and reviews.☆18Nov 5, 2022Updated 3 years ago