Voice Conversion Attacks on Speaker De-Identification Schemes.
Shufei HePeter RoelsePublished in: ICCE (2020)
Keyphrases
- synthesized speech
- prosodic features
- speaker verification
- malicious attacks
- speaker recognition
- speech recognition
- countermeasures
- cryptographic algorithms
- security threats
- audio visual
- emotion recognition
- security protocols
- computer security
- malicious users
- security mechanisms
- automatic speech recognition
- chosen plaintext