Nov. 21, 2022, 2:11 a.m. | Zhenyu Wang, John H.L. Hansen

cs.LG updates on arXiv.org arxiv.org

Automatic speaker verification systems are vulnerable to a variety of access
threats, prompting research into the formulation of effective spoofing
detection systems to act as a gate to filter out such spoofing attacks. This
study introduces a simple attention module to infer 3-dim attention weights for
the feature map in a convolutional layer, which then optimizes an energy
function to determine each neuron's importance. With the advancement of both
voice conversion and speech synthesis technologies, unseen spoofing attacks are
constantly …

angular arxiv attention audio loss meta meta-learning optimization

Software Engineer for AI Training Data (School Specific)

@ G2i Inc | Remote

Software Engineer for AI Training Data (Python)

@ G2i Inc | Remote

Software Engineer for AI Training Data (Tier 2)

@ G2i Inc | Remote

Data Engineer

@ Lemon.io | Remote: Europe, LATAM, Canada, UK, Asia, Oceania

Artificial Intelligence – Bioinformatic Expert

@ University of Texas Medical Branch | Galveston, TX

Lead Developer (AI)

@ Cere Network | San Francisco, US