Adversarial attack and defense strategies for deep speaker recognition systems
☆41Feb 18, 2021Updated 5 years ago
Alternatives and similar repositories for gard-adversarial-speaker-id
Users that are interested in gard-adversarial-speaker-id are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ICASSP 2021 accepted paper☆20May 20, 2021Updated 4 years ago
- Source code for paper "Who is real Bob? Adversarial Attacks on Speaker Recognition Systems" (IEEE S&P 2021)☆102Nov 18, 2022Updated 3 years ago
- Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078☆35Mar 9, 2020Updated 6 years ago
- code for paper "Universal Adversarial Perturbations Generative Network for Speaker Recognition"☆23Nov 23, 2020Updated 5 years ago
- Source Code for 'SECurity evaluation platform FOR Speaker Recognition' released in 'Defending against Audio Adversarial Examples on Speak…☆28May 29, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is the implementation of the paper "Adversarial Attacks on Spoofing Countermeasures of automatic speaker verification".☆42Mar 9, 2023Updated 3 years ago
- code for paper "learning to fool the speaker recognition"☆10Jun 12, 2020Updated 5 years ago
- Repository for the source code and adversarial samples of FoolHD☆18Jan 4, 2022Updated 4 years ago
- Example external repository for interacting with armory.☆11May 2, 2022Updated 3 years ago
- This repository includes the code to reproduce our paper [Explainable deepfake and spoofing detection: an attack analysis using SHapley A…☆12Jan 24, 2024Updated 2 years ago
- ☆12Nov 30, 2021Updated 4 years ago
- Google's TPGST reimplementation.☆34Dec 11, 2019Updated 6 years ago
- Deep speaker embeddings in PyTorch, including x-vectors. Code used in this work: https://arxiv.org/abs/2007.16196☆321Nov 11, 2020Updated 5 years ago
- WaveNet implementation using tf.estimator☆21Jul 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Universal Adversarial Audio Perturbations☆17May 29, 2020Updated 5 years ago
- ☆36Aug 30, 2019Updated 6 years ago
- The code of ICCV2021 paper "Meta Gradient Adversarial Attack"☆26Dec 11, 2021Updated 4 years ago
- Compressed version of Tacotron 2 using Tensor Train + Waveglow.☆22Dec 26, 2019Updated 6 years ago
- follow NVIDIA, simplify it and support data parallel.☆13Sep 26, 2019Updated 6 years ago
- ☆86Dec 31, 2025Updated 2 months ago
- Dan's repository of OpenFst (manually created by downloading certain versions of OpenFst), created to track certain patches.☆13Mar 8, 2016Updated 10 years ago
- Attacking Speaker Recognition with Deep Generative Models☆34Mar 24, 2023Updated 3 years ago
- Targeted Adversarial Examples for Black Box Audio Systems☆69Aug 27, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Repo for papers to read on adversarial attack and defense techniques in the audio domain.☆41Dec 6, 2020Updated 5 years ago
- The official source code of UniAudio☆95Mar 29, 2024Updated 2 years ago
- a Pytorch library for security research on speaker recognition, released in "Towards Understanding and Mitigating Audio Adversarial Examp…☆44Nov 20, 2024Updated last year
- Trusted ML Pipeline Tutorial☆17Aug 7, 2019Updated 6 years ago
- ☆34Jul 16, 2019Updated 6 years ago
- Baseline Recipe for VoicePrivacy Challenge 2022: anonymization systems and evaluation software☆69Oct 17, 2024Updated last year
- Generative Models to hide Audio inside Images using custom loss functions and Spectrogram Analysis☆21Dec 2, 2021Updated 4 years ago
- Targeted Adversarial Examples on Speech-to-Text systems☆309Jul 24, 2022Updated 3 years ago
- Official implementation of Self-Remixing☆17Feb 3, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆70Nov 30, 2020Updated 5 years ago
- streaming attention networks for end-to-end automatic speech recognition☆55May 6, 2020Updated 5 years ago
- Based on https://github.com/fatchord/WaveRNN☆24May 3, 2020Updated 5 years ago
- PPSpeech: Phrase based Parallel End-to-End TTS System☆35Aug 31, 2020Updated 5 years ago
- Keras implementation of conditional waveGAN. Application to knocking sound effects with emotion.☆11Jun 22, 2020Updated 5 years ago
- Public repository for "DCT-Former: Efficient Self-Attention withDiscrete Cosine Transform"☆18Mar 15, 2023Updated 3 years ago
- TDY-CNN for text-independent speaker verification☆19Nov 7, 2022Updated 3 years ago