%Aigaion2 BibTeX export from Idiap Publications
%Thursday 02 May 2024 11:45:35 AM

@INPROCEEDINGS{Korshunov_BTAS_2016,
         author = {Korshunov, Pavel and Marcel, S{\'{e}}bastien and Muckenhirn, Hannah and Gon{\c c}alves, A. R. and Mello, A. G. Souza and Violato, R. P. Velloso and Sim{\~{o}}es, F. O. and Neto, M. U. and de Assis Angeloni, M. and Stuchi, J. A. and Dinkel, H. and Chen, N. and Qian, Y. and Paul, D. and Saha, G. and Sahidullah, Md},
       projects = {Idiap, BEAT, SWAN},
          month = sep,
          title = {Overview of BTAS 2016 Speaker Anti-spoofing Competition},
      booktitle = {IEEE International Conference on Biometrics: Theory, Applications and Systems},
           year = {2016},
        address = {Niagara Falls, NY, USA},
            url = {https://pypi.python.org/pypi/bob.paper.btas_c2016},
       crossref = {Korshunov_Idiap-RR-24-2016},
       abstract = {This paper provides an overview of the Speaker Anti-spoofing Competition organized by Biometric group at Idiap Research Institute for the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2016). The competition used AVspoof database, which contains a comprehensive set of presentation attacks, including, (i) direct replay attacks when a genuine data is played back using a laptop and two phones (Samsung Galaxy S4 and iPhone 3G), (ii) synthesized speech replayed with a laptop, and (iii) speech created with a voice conversion algorithm, also replayed with a laptop. 
The paper states competition goals, describes the database and the evaluation protocol, discusses solutions for spoofing or presentation attack detection submitted by the participants, and presents the results of the evaluation.},
            pdf = {https://publications.idiap.ch/attachments/papers/2017/Korshunov_BTAS_2016.pdf}
}



crossreferenced publications: 
@TECHREPORT{Korshunov_Idiap-RR-24-2016,
         author = {Korshunov, Pavel and Marcel, S{\'{e}}bastien and Muckenhirn, Hannah and Gon{\c c}alves, A. R. and Mello, A. G. Souza and Violato, R. P. Velloso and Sim{\~{o}}es, Fl{\'{a}}vio and Uliani Neto, M{\'{a}}rio and de Assis Angeloni, Marcus and Stuchi, J. A. and Dinkel, H. and Chen, N. and Qian, Yanmin and Paul, D. and Saha, G. and Sahidullah, Md},
       projects = {Idiap, BEAT},
          month = {10},
          title = {Overview of BTAS 2016 Speaker Anti-spoofing Competition},
           type = {Idiap-RR},
         number = {Idiap-RR-24-2016},
           year = {2016},
    institution = {Idiap},
        address = {Niagara Falls, NY, USA},
           note = {Open source software for the paper: https://pypi.python.org/pypi/bob.paper.btas_c2016},
            url = {https://pypi.python.org/pypi/bob.paper.btas_c2016},
       abstract = {This paper provides an overview of the Speaker Anti-spoofing Competition organized by Biometric group at Idiap Research Institute for the IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2016). The competition used AVspoof database, which contains a comprehensive set of presentation attacks, including, (i) direct replay attacks when a genuine data is played back using a laptop and two phones (Samsung Galaxy S4 and iPhone 3G), (ii) synthesized speech replayed with a laptop, and (iii) speech created with a voice conversion algorithm, also replayed with a laptop. 
The paper states competition goals, describes the database and the evaluation protocol, discusses solutions for spoofing or presentation attack detection submitted by the participants, and presents the results of the evaluation.},
            pdf = {https://publications.idiap.ch/attachments/reports/2016/Korshunov_Idiap-RR-24-2016.pdf}
}