Nov. 21, 2022, 2:11 a.m. | Zhenyu Wang, John H.L. Hansen

cs.LG updates on arXiv.org arxiv.org

Automatic speaker verification systems are vulnerable to a variety of access
threats, prompting research into the formulation of effective spoofing
detection systems to act as a gate to filter out such spoofing attacks. This
study introduces a simple attention module to infer 3-dim attention weights for
the feature map in a convolutional layer, which then optimizes an energy
function to determine each neuron's importance. With the advancement of both
voice conversion and speech synthesis technologies, unseen spoofing attacks are
constantly …

angular arxiv attention audio loss meta meta-learning optimization

Data Architect

@ University of Texas at Austin | Austin, TX

Data ETL Engineer

@ University of Texas at Austin | Austin, TX

Lead GNSS Data Scientist

@ Lurra Systems | Melbourne

Senior Machine Learning Engineer (MLOps)

@ Promaton | Remote, Europe

Senior Business Intelligence Developer / Analyst

@ Transamerica | Work From Home, USA

Data Analyst (All Levels)

@ Noblis | Bethesda, MD, United States