Author of the publication

Integrating frame-level boundary detection and deepfake detection for locating manipulated regions in partially spoofed audio forgery attacks.

, and . Comput. Speech Lang., (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Learnable Dictionary Encoding Layer for End-to-End Language Identification., , , , and . ICASSP, page 5189-5193. IEEE, (2018)End-to-end Language Identification using NetFV and NetVLAD., , , , , and . ISCSLP, page 319-323. IEEE, (2018)The DKU-DUKEECE System for the Manipulation Region Location Task of ADD 2023., , , and . CoRR, (2023)Identifying Source Speakers for Voice Conversion based Spoofing Attacks on Speaker Verification Systems., , and . CoRR, (2022)Insights into End-to-End Learning Scheme for Language Identification., , , , and . CoRR, (2018)Identifying Source Speakers for Voice Conversion Based Spoofing Attacks on Speaker Verification Systems., , and . ICASSP, page 1-5. IEEE, (2023)Electrolaryngeal speech enhancement based on a two stage framework with bottleneck feature refinement and voice conversion., , , , , , , , and . Biomed. Signal Process. Control., 80 (Part): 104279 (2023)Polyphone Disambiguation for Mandarin Chinese Using Conditional Neural Network with Multi-Level Embedding Features., , , , and . INTERSPEECH, page 2110-2114. ISCA, (2019)Self-supervised Reflective Learning through Self-distillation and Online Clustering for Speaker Representation Learning., , and . CoRR, (2024)Invertible Voice Conversion., and . CoRR, (2022)