Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Resmax: Detecting voice spoofing attacks with residual network and max feature map

Full metadata record
DC Field Value Language
dc.contributor.authorKwak, I.-Y.-
dc.contributor.authorKwag, S.-
dc.contributor.authorLee, J.-
dc.contributor.authorHuh, J.H.-
dc.contributor.authorLee, C.-H.-
dc.contributor.authorJeon, Y.-
dc.contributor.authorHwang, J.-
dc.contributor.authorYoon, J.W.-
dc.date.accessioned2023-03-08T12:44:19Z-
dc.date.available2023-03-08T12:44:19Z-
dc.date.issued2020-
dc.identifier.issn1051-4651-
dc.identifier.urihttps://scholarworks.bwise.kr/cau/handle/2019.sw.cau/62904-
dc.description.abstractThe “2019 Automatic Speaker Verification Spoofing And Countermeasures Challenge” (ASVspoof) competition aimed to facilitate the design of highly accurate voice spoofing attack detection systems. the competition did not emphasize model complexity and latency requirements; such constraints are strict and integral in real-world deployment. Hence, most of the top performing solutions from the competition all used an ensemble approach, and combined multiple complex deep learning models to maximize detection accuracy - this kind of approach would sit uneasily with real-world deployment constraints. To design a lightweight system, we combined the notions of skip connection (from ResNet) and max feature map (from Light CNN), and evaluated the accuracy of the system using the ASVspoof 2019 dataset. With an optimized constant Q transform (CQT) feature, our single model achieved a replay attack detection equal error rate (EER) of 0.37% on the evaluation set, surpassing the top ensemble system from the competition that achieved an EER of 0.39%. © 2020 IEEE-
dc.format.extent8-
dc.language영어-
dc.language.isoENG-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleResmax: Detecting voice spoofing attacks with residual network and max feature map-
dc.typeArticle-
dc.identifier.doi10.1109/ICPR48806.2021.9412165-
dc.identifier.bibliographicCitationProceedings - International Conference on Pattern Recognition, pp 4837 - 4844-
dc.description.isOpenAccessN-
dc.identifier.wosid000678409204127-
dc.identifier.scopusid2-s2.0-85110423250-
dc.citation.endPage4844-
dc.citation.startPage4837-
dc.citation.titleProceedings - International Conference on Pattern Recognition-
dc.type.docTypeProceedings Paper-
dc.subject.keywordAuthorVoice assistant security-
dc.subject.keywordAuthorVoice presentation attack detection-
dc.subject.keywordAuthorVoice spoofing attack-
dc.subject.keywordAuthorVoice synthesis attack-
dc.subject.keywordPlusComplex networks-
dc.subject.keywordPlusDeep learning-
dc.subject.keywordPlusFeature extraction-
dc.subject.keywordPlusAutomatic speaker verification-
dc.subject.keywordPlusConstant q transforms-
dc.subject.keywordPlusDetection accuracy-
dc.subject.keywordPlusEnsemble approaches-
dc.subject.keywordPlusLightweight systems-
dc.subject.keywordPlusModel complexity-
dc.subject.keywordPlusReal world deployment-
dc.subject.keywordPlusSpoofing attacks-
dc.subject.keywordPlusSpeech recognition-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaImaging Science & Photographic Technology-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryImaging Science & Photographic Technology-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Business & Economics > Department of Applied Statistics > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kwak, Il-Youp photo

Kwak, Il-Youp
대학원 (통계데이터사이언스학과)
Read more

Altmetrics

Total Views & Downloads

BROWSE