Keywords:
- Anti-spoofing
- Benchmarking
- Biometrics
- cross-database
- cross-database testing
- deepfake detection
- Deepfakes
- Demographic bias
- detection
- diarization
- DIHARD challenge
- evaluation
- Face Recognition
- Fairness
- generalization
- inconsistencies detection
- lip-syncing
- LSTM
- machine learning
- Morphing Attack
- Open Source
- pattern recognition
- presentation attack
- Presentation Attack Detection
- Reproducibility Criteria
- Reproducible research
- score fusion
- single-channel and multi-channel speech
- Software Frameworks
- speaker anti-spoofing
- speaker database
- speaker recognition
- spectral statistics
- StyleGAN 2
- Synthetic Dataset
- Video tampering
- voice biometrics
- vulnerability
- Vulnerability Analysis
Publications of Pavel Korshunov sorted by title
| 1 | 2 |
A
| A Cross-database Study of Voice Presentation Attack Detection, and , in: Handbook of Biometric Anti-Spoofing: Presentation Attack Detection, 2nd Edition, Springer, 2018 |
| Are GAN-based Morphs Threatening Face Recognition?, , , and , in: International Conference on Acoustics, Speech and Signal Processing, 2022 |
|
C
| Continuously Reproducing Toolchains in Pattern Recognition and Machine Learning Experiments, , , , , and , in: Thirty-fourth International Conference on Machine Learning, Sidney, Australia, 2017 |
[URL] |
| Cross-database evaluation of audio-based spoofing detection systems, and , Idiap-RR-23-2016 |
[URL] |
| Cross-database evaluation of audio-based spoofing detection systems, and , in: Interspeech, San Francisco, USA, 2016 |
[URL] |
| Custom attribution loss for improving generalization and interpretability of deepfake detection, , and , in: International Conference on Acoustics, Speech, and Signal Processing, 2022 |
|
D
| Deepfake detection: humans vs. machines, and , Idiap-RR-36-2020 |
|
| DeepFakes: a New Threat to Face Recognition? Assessment and Detection, and , Idiap-RR-18-2018 |
|
| DeepID Challenge of Detecting Synthetic Manipulations in ID Documents, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference on Computer Vision (ICCV), 2025 |
|
| Detecting Text Manipulation in Images using Vision Language Models, , , , , and , in: 36th British Machine Vision Conference 2025, 2025 |
|
F
| Face Anthropometry Aware Audio-visual Age Verification, and , in: ACM Multimedia, 2022 |
|
| FantasyID: A dataset for detecting digital manipulations of ID-documents, , , , and , in: Proceedings of IEEE International Joint Conference on Biometrics, 2025 |
|
H
| HintsOfTruth: A Multimodal Checkworthiness Detection Dataset with Real and Synthetic Claims, , , and , in: The 63rd Annual Meeting of the Association for Computational Linguistics, 2025 |
|
I
| Identity-Preserving Aging and De-Aging of Faces in the StyleGAN Latent Space, , and , in: 2025 IEEE International Joint Conference on Biometrics (IJCB), IEEE, 2025 |
|
| Impact of score fusion on voice biometrics and presentation attack detection in cross-database evaluations, and , in: IEEE Journal of Selected Topics in Signal Processing, 11(4):695 - 705, 2017 |
[DOI] |
| Improving Generalization of Deepfake Detection by Training for Attribution, , and , in: International Workshop on Multimedia Signal Processing, 2021 |
|
| Improving Generalization of Deepfake Detection with Data Farming and Few-Shot Learning, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
|
| Investigation of accuracy and bias in face recognition trained with synthetic data, , , , , and , in: Proceedings of IEEE International Joint Conference on Biometrics, 2025 |
|
J
| Joint Operation of Voice Biometrics and Presentation Attack Detection, and , Idiap-RR-25-2016 |
[URL] |
| Joint Operation of Voice Biometrics and Presentation Attack Detection, and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, 2016 |
[URL] |
L
| Long Term Spectral Statistics for Voice Presentation Attack Detection, , , and , Idiap-RR-11-2017 |
|
| Long-Term Spectral Statistics for Voice Presentation Attack Detection, , , and , in: IEEE/ACM Transactions on Audio, Speech and Language Processing, 25(11):2098-2111, 2017 |
|
O
| On the Generalization of Fused Systems in Voice Presentation Attack Detection, , , , and , in: 16th International Conference of the Biometrics Special Interest Group, 2017 |
|
| On the Use of Convolutional Neural Networks for Speech Presentation Attack Detection, , , , and , in: International Conference on Identity, Security and Behavior Analysis, 2018 |
|
| Overview of BTAS 2016 Speaker Anti-spoofing Competition, , , , , , , , , , , , , , , and , Idiap-RR-24-2016 |
[URL] |
| Overview of BTAS 2016 Speaker Anti-spoofing Competition, , , , , , , , , , , , , , , and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, 2016 |
[URL] |
P
| Presentation attack detection in voice biometrics, and , in: User-Centric Privacy and Security in Biometrics, The Institution of Engineering and Technology, 2017 |
|
P
| pyannote.audio: neural building blocks for speaker diarization, , , , , , , , and , in: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2020 |
[URL] |
S
| Speaker Inconsistency Detection in Tampered Video, and , in: European Signal Processing Conference, 2018 |
|
| 1 | 2 |