On the use of deep recurrent neural networks for detecting audio spoofing attacks.
Simone ScardapaneLucas StofflFlorian RöhrbeinAurelio UnciniPublished in: IJCNN (2017)
Keyphrases
- recurrent neural networks
- neural network
- feed forward
- recurrent networks
- complex valued
- network intrusion detection systems
- echo state networks
- feedforward neural networks
- artificial neural networks
- countermeasures
- multimedia
- reservoir computing
- cascade correlation
- identity theft
- detect malicious
- neural model
- hebbian learning
- malicious activities
- detecting malicious
- long short term memory
- audio visual
- real time
- decision making
- nonlinear dynamic systems
- visual information