Keywords:
- Anti-spoofing
- Benchmarking
- Biometrics
- cross-database
- cross-database testing
- deepfake detection
- Deepfakes
- detection
- diarization
- DIHARD challenge
- evaluation
- Face Recognition
- generalization
- inconsistencies detection
- lip-syncing
- LSTM
- machine learning
- Morphing Attack
- Open Source
- pattern recognition
- presentation attack
- Presentation Attack Detection
- Reproducibility Criteria
- Reproducible research
- score fusion
- single-channel and multi-channel speech
- Software Frameworks
- speaker anti-spoofing
- speaker database
- speaker recognition
- spectral statistics
- StyleGAN 2
- Video tampering
- voice biometrics
- vulnerability
- Vulnerability Analysis
Publications of Pavel Korshunov sorted by recency
Vulnerability of Face Age Verification to Replay Attacks, , , and , in: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2024 |
|
Vulnerability of Automatic Identity Recognition to Audio-Visual Deepfakes, , , and , in: IEEE International Joint Conference on Biometrics, 2023 |
|
Face Anthropometry Aware Audio-visual Age Verification, and , in: ACM Multimedia, 2022 |
|
Are GAN-based Morphs Threatening Face Recognition?, , , and , in: International Conference on Acoustics, Speech and Signal Processing, 2022 |
|
Custom attribution loss for improving generalization and interpretability of deepfake detection, , and , in: International Conference on Acoustics, Speech, and Signal Processing, 2022 |
|
Improving Generalization of Deepfake Detection with Data Farming and Few-Shot Learning, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
|
Improving Generalization of Deepfake Detection by Training for Attribution, , and , in: International Workshop on Multimedia Signal Processing, 2021 |
|
Subjective and objective evaluation of deepfake videos, and , in: The international Conference on Acoustics, Speech, and Signal Processing, 2021 |
|
Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks, , , and , Idiap-RR-38-2020 |
|
Deepfake detection: humans vs. machines, and , Idiap-RR-36-2020 |
|
pyannote.audio: neural building blocks for speaker diarization, , , , , , , , and , in: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2020 |
[URL] |
Vulnerability of Face Recognition to Deep Morphing, and , in: International Conference on Biometrics for Borders, 2019 |
|
The Speed Submission to DIHARD II: Contributions & Lessons Learned, , , , , , , , , , , , , and , Idiap-RR-14-2019 |
|
Tampered Speaker Inconsistency Detection with Phonetically Aware Audio-visual Features, , , , , , , and , in: International Conference on Machine Learning, 2019 |
|
Vulnerability assessment and detection of Deepfake videos, and , in: IAPR International Conference on Biometrics, 2019 |
|
DeepFakes: a New Threat to Face Recognition? Assessment and Detection, and , Idiap-RR-18-2018 |
|
A Cross-database Study of Voice Presentation Attack Detection, and , in: Handbook of Biometric Anti-Spoofing: Presentation Attack Detection, 2nd Edition, Springer, 2018 |
Speaker Inconsistency Detection in Tampered Video, and , in: European Signal Processing Conference, 2018 |
|
On the Use of Convolutional Neural Networks for Speech Presentation Attack Detection, , , , and , in: International Conference on Identity, Security and Behavior Analysis, 2018 |
|
Long-Term Spectral Statistics for Voice Presentation Attack Detection, , , and , in: IEEE/ACM Transactions on Audio, Speech and Language Processing, 25(11):2098-2111, 2017 |
|
On the Generalization of Fused Systems in Voice Presentation Attack Detection, , , , and , in: 16th International Conference of the Biometrics Special Interest Group, 2017 |
|
Presentation attack detection in voice biometrics, and , in: User-Centric Privacy and Security in Biometrics, The Institution of Engineering and Technology, 2017 |
|
Impact of score fusion on voice biometrics and presentation attack detection in cross-database evaluations, and , in: IEEE Journal of Selected Topics in Signal Processing, 11(4):695 - 705, 2017 |
[DOI] |
Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
Long Term Spectral Statistics for Voice Presentation Attack Detection, , , and , Idiap-RR-11-2017 |
|
Joint Operation of Voice Biometrics and Presentation Attack Detection, and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, 2016 |
[URL] |
Overview of BTAS 2016 Speaker Anti-spoofing Competition, , , , , , , , , , , , , , , and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, 2016 |
[URL] |
Cross-database evaluation of audio-based spoofing detection systems, and , in: Interspeech, San Francisco, USA, 2016 |
[URL] |
Overview of BTAS 2016 Speaker Anti-spoofing Competition, , , , , , , , , , , , , , , and , Idiap-RR-24-2016 |
[URL] |
Joint Operation of Voice Biometrics and Presentation Attack Detection, and , Idiap-RR-25-2016 |
[URL] |
Cross-database evaluation of audio-based spoofing detection systems, and , Idiap-RR-23-2016 |
[URL] |