dalision / IVA-Xception
IVA-Xception model which can achieve high performance in identifying multiple birds from overlapping bird sounds recordings based on IVA and Xception
☆14Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for IVA-Xception
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆35Updated 5 months ago
- Official Implementation of VoxTracer (MM' 23)☆10Updated last year
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆100Updated last year
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆25Updated last year
- 使用DES加密算法通过四种操作模式(ECB\CBC\CFB\OFB)实现对文件的加密;Using DES algorithm encode files through four different patterns☆10Updated 4 years ago
- A curated list of awesome audio adversarial examples papers(with code & demo if available).☆31Updated 4 years ago
- BambooFuzz: An IoT Firmware Vulnerability Mining System based on Static and Dynamic Analysis☆52Updated 2 years ago
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆33Updated 3 years ago
- The pytorch implementation of BAM for Partialspoof Audio Localization.☆13Updated 2 months ago
- ASVspoof 2021 Baseline Systems☆206Updated 5 months ago
- Code of paper "AdvReverb: AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception"☆14Updated 11 months ago
- ☆39Updated 3 months ago
- Defending against Adversarial Audio via Diffusion Model (ICLR 2023)☆25Updated last year
- KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems☆14Updated last year
- Synthesis speech detection based on Breathing-Talking-Silence sounds☆16Updated 3 weeks ago
- Light CNN for ASVSpoof 2019 implemented on Tensorflow and Keras☆31Updated last year
- Code for ISSTA'21 paper 'Attack as Defense: Characterizing Adversarial Examples using Robustness'.☆10Updated 3 years ago
- ☆35Updated 3 weeks ago
- This is the pytorch implementation of our work titled "An Efficient Temporary Deepfake Location Approach Based Embeddings for Partially S…☆10Updated last week
- Pytorch implementation of Backdoor Attack against Speaker Verification☆23Updated last year
- This is the official repo of our work titled "The Codecfake Dataset and Countermeasures for the Universally Detection of Deepfake Audio".☆40Updated last month
- Reproduction of paper Void: A Fast and Light Voice Liveness Detection System☆16Updated 4 years ago
- Continual Learning Method RAWM for ICML 2023☆20Updated last month
- A list of tools, papers and code related to Fake Audio Detection.☆22Updated last week
- Official implementation of the SPL paper "One-class Learning Towards Synthetic Voice Spoofing Detection"☆111Updated 2 months ago
- This is the codebase for defense framework described in USENIX '21 paper "WaveGuard: Understanding and Mitigating Audio Adversarial Examp…☆16Updated 3 years ago
- This repository includes the code to reproduce our paper "Automatic speaker verification spoofing and deepfake detection using wav2vec 2.…☆107Updated last year
- Our submission to the ASVspoof 2019: Automatic Speaker Verification Spoofing and Countermeasures Challenge☆96Updated 4 years ago
- This repository includes the code to reproduce our paper "End-to-end anti-spoofing with RawNet2" (https://arxiv.org/abs/2011.01108) publi…☆48Updated last year