lixucuhk / adversarial-attack-on-GMM-i-vector-based-speaker-verification-systemsView external linksLinks
Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078
☆35Mar 9, 2020Updated 5 years ago
Alternatives and similar repositories for adversarial-attack-on-GMM-i-vector-based-speaker-verification-systems
Users that are interested in adversarial-attack-on-GMM-i-vector-based-speaker-verification-systems are comparing it to the libraries listed below
Sorting:
- Adversarial attack and defense strategies for deep speaker recognition systems☆42Feb 18, 2021Updated 4 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆105Nov 18, 2022Updated 3 years ago
- This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".☆42Mar 9, 2023Updated 2 years ago
- ICASSP 2021 accepted paper☆20May 20, 2021Updated 4 years ago
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- PyTorch implementation of PLDA as described in https://ravisoji.com/assets/papers/ioffe2006probabilistic.pdf☆15Oct 16, 2020Updated 5 years ago
- code for paper "learning to fool the speaker recognition"☆10Jun 12, 2020Updated 5 years ago
- Dan's repository of OpenFst (manually created by downloading certain versions of OpenFst), created to track certain patches.☆13Mar 8, 2016Updated 9 years ago
- Neural speaker recognition/verification system based on Kaldi and Tensorflow☆32Jun 30, 2020Updated 5 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆70Aug 27, 2020Updated 5 years ago
- VoxCeleb plugin for pyannote.database☆30Aug 4, 2021Updated 4 years ago
- A pytorch implementation of xvector embedding☆79Mar 28, 2020Updated 5 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆310Jul 24, 2022Updated 3 years ago
- 6 DoF Directional Room Impulse Response (RIR) with Dense Loudspeaker Grid☆17Aug 31, 2023Updated 2 years ago
- GPU accelerated implementation of i-vector extractor training using PyTorch. Requires Kaldi for feature extraction and UBM training. An e…☆63Oct 15, 2019Updated 6 years ago
- Extension to Kaldi implementing the standard i-vector hyperparameter estimation and i-vector extraction procedure☆88Feb 23, 2018Updated 7 years ago
- Reproduction of paper Void: A Fast and Light Voice Liveness Detection System☆19Aug 19, 2020Updated 5 years ago
- Contains code for Deep Self Supervised Heirarchical Clustering for Speaker Diarization☆17Dec 16, 2021Updated 4 years ago
- MSR Identity Toolkit v1.0☆17Aug 18, 2017Updated 8 years ago
- TDY-CNN for text-independent speaker verification☆19Nov 7, 2022Updated 3 years ago
- ☆15Jan 24, 2017Updated 9 years ago
- This is a curated list of awesome ASV(Automatic Speaker Verification) Anti-Spoofing papers, libraries, datasets, and other resources.☆22May 21, 2021Updated 4 years ago
- Adversarial Attacks☆21Oct 11, 2021Updated 4 years ago
- The Additive Margin SincNet (AM-SincNet) is a new approach for speaker recognition problems which is based in the neural network architec…☆46Oct 3, 2023Updated 2 years ago
- Development Toolkit for the VoxCeleb Speaker Recognition Challenge 2020☆43Jul 17, 2020Updated 5 years ago
- Time Delayed NN implemented in pytorch☆81Mar 27, 2017Updated 8 years ago
- Deep speaker embeddings in PyTorch, including x-vectors. Code used in this work: https://arxiv.org/abs/2007.16196☆320Nov 11, 2020Updated 5 years ago
- Deep Discriminative Embeddings for Duration Robust Speaker Verification☆19Dec 16, 2019Updated 6 years ago
- Voxceleb1 i-vector based speaker recognition system☆43May 22, 2018Updated 7 years ago
- It turns out that adversarial and clean data are not twins, not at all.☆18Apr 19, 2017Updated 8 years ago
- D3M - Dynamic Data Discrepancy Mitigation for Anti-spoofing - Implementation of work Dynamically Mitigating Data Discrepancy with Balance…☆30Feb 15, 2023Updated 3 years ago
- Speaker identification with VGGVox network☆84Nov 30, 2018Updated 7 years ago
- We implemented the DEMUCS model for speech enhancement in the time-frequency domain, and additionally implemented HD-DEMUCS.☆33Nov 8, 2023Updated 2 years ago
- An LDA/PLDA estimator using KALDI in python for speaker verification tasks☆102Apr 15, 2017Updated 8 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- Implementation of the paper: Channel-wise Gated Res2Net: Towards Robust Detection of Synthetic Speech Attacks (INTERSPEECH 2021)☆31Jul 21, 2021Updated 4 years ago