Bridging the Spoof Gap: A Unified Parallel Aggregation Network for Voice Presentation Attacks.
Awais KhanKhalid Mahmood MalikPublished in: CoRR (2023)
Keyphrases
- traffic analysis
- network anomaly detection
- computer networks
- wireless sensor networks
- complex networks
- network model
- network structure
- parallel processing
- peer to peer
- denial of service attacks
- network attacks
- multimedia
- network architecture
- parallel implementation
- parallel computing
- data aggregation
- security threats
- security risks