Alert button
Picture for Wanying Ge

Wanying Ge

Alert button

Spoofing attack augmentation: can differently-trained attack models improve generalisation?

Add code
Bookmark button
Alert button
Sep 18, 2023
Wanying Ge, Xin Wang, Junichi Yamagishi, Massimiliano Todisco, Nicholas Evans

Viaarxiv icon

Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

Add code
Bookmark button
Alert button
Jun 13, 2023
Michele Panariello, Wanying Ge, Hemlata Tak, Massimiliano Todisco, Nicholas Evans

Figure 1 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 2 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 3 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Figure 4 for Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems
Viaarxiv icon

Can spoofing countermeasure and speaker verification systems be jointly optimised?

Add code
Bookmark button
Alert button
Mar 31, 2023
Wanying Ge, Hemlata Tak, Massimiliano Todisco, Nicholas Evans

Figure 1 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 2 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 3 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Figure 4 for Can spoofing countermeasure and speaker verification systems be jointly optimised?
Viaarxiv icon

Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations

Add code
Bookmark button
Alert button
Feb 28, 2022
Wanying Ge, Massimiliano Todisco, Nicholas Evans

Figure 1 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 2 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 3 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Figure 4 for Explainable deepfake and spoofing detection: an attack analysis using SHapley Additive exPlanations
Viaarxiv icon

Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations

Add code
Bookmark button
Alert button
Oct 07, 2021
Wanying Ge, Jose Patino, Massimiliano Todisco, Nicholas Evans

Figure 1 for Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations
Figure 2 for Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations
Figure 3 for Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations
Figure 4 for Explaining deep learning models for spoofing and deepfake detection with SHapley Additive exPlanations
Viaarxiv icon

Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection

Add code
Bookmark button
Alert button
Jul 26, 2021
Wanying Ge, Jose Patino, Massimiliano Todisco, Nicholas Evans

Figure 1 for Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection
Figure 2 for Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection
Figure 3 for Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection
Figure 4 for Raw Differentiable Architecture Search for Speech Deepfake and Spoofing Detection
Viaarxiv icon

Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection

Add code
Bookmark button
Alert button
Apr 07, 2021
Wanying Ge, Michele Panariello, Jose Patino, Massimiliano Todisco, Nicholas Evans

Figure 1 for Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection
Figure 2 for Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection
Figure 3 for Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection
Figure 4 for Partially-Connected Differentiable Architecture Search for Deepfake and Spoofing Detection
Viaarxiv icon