Login / Signup

On the application of conformers to logical access voice spoofing attack detection.

Eros RoselloAlejandro Gómez AlanísManuel ChicaAngel M. GomezJosé A. GonzálezAntonio M. Peinado
Published in: IberSPEECH (2022)
Keyphrases
  • attack detection
  • state space
  • access control
  • intrusion detection system