1 code implementation • 23 May 2023 • Eklavya Sarkar, Mathew Magimai. -Doss
Self-supervised learning (SSL) models use only the intrinsic structure of a given signal, independent of its acoustic domain, to extract essential information from the input to an embedding space.
Ranked #1 on Caller Detection on InfantMarmosetsVox
1 code implementation • 27 Jun 2022 • Eklavya Sarkar, RaviShankar Prasad, Mathew Magimai. -Doss
This paper investigates the potential of zero-frequency filtering for jointly modeling voice source and vocal tract system information, and proposes two approaches for VAD.
1 code implementation • 5 May 2022 • Eklavya Sarkar, Pavel Korshunov, Laurent Colbois, Sébastien Marcel
Morphing attacks are a threat to biometric systems where the biometric reference in an identity document can be altered.
1 code implementation • 9 Dec 2020 • Eklavya Sarkar, Pavel Korshunov, Laurent Colbois, Sébastien Marcel
Morphing attacks is a threat to biometric systems where the biometric reference in an identity document can be altered.