Login / Signup
Vulnerability of Voice Verification Systems to Spoofing Attacks by TTS Voices Based on Automatically Labeled Telephone Speech.
Vadim Shchemelinin
Mariia Topchina
Konstantin Simonchik
Published in:
SPECOM (2014)
Keyphrases
</>
text to speech
speech synthesis
network intrusion detection systems
model checking
email
speech recognition
formal methods
male and female