Login / Signup

Vulnerability of Voice Verification Systems to Spoofing Attacks by TTS Voices Based on Automatically Labeled Telephone Speech.

Vadim ShchemelininMariia TopchinaKonstantin Simonchik
Published in: SPECOM (2014)
Keyphrases
  • text to speech
  • speech synthesis
  • network intrusion detection systems
  • model checking
  • email
  • speech recognition
  • formal methods
  • male and female