Application of Voiceprint Recognition Technology Based on Channel Confrontation Training in the Field of Information Security
With the rapid development of big data, artificial intelligence, and Internet technologies, human–human contact and human–machine interaction have led to an explosion of voice data. Rapidly identifying the speaker’s identity and retrieving and managing their speech data among the massive amount of s...
Main Authors: | Suying Gui, Chuan Zhou, Hao Wang, Tiegang Gao |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-08-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/12/15/3309 |
Similar Items
-
A Highly Stealthy Adaptive Decay Attack Against Speaker Recognition
by: Xinyu Zhang, et al.
Published: (2022-01-01) -
Improving Speaker Recognition by Biometric Voice Deconstruction
by: Luis Miguel eMazaira-Fernández, et al.
Published: (2015-09-01) -
A Robust CycleGAN-L2 Defense Method for Speaker Recognition System
by: Lingyi Yang, et al.
Published: (2023-01-01) -
Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey
by: Hao Tan, et al.
Published: (2022-07-01) -
Deep ATC speaker recognition based on voiceprint aggregation
by: LI Yin-xuan, TANG Wen-yi, YANG Tao, WANG Xue-chuan, LI Cheng-xiang
Published: (2023-04-01)