Search Results for author: Hye-jin Shim

Found 24 papers, 11 papers with code

How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning

no code implementations31 May 2023 Hye-jin Shim, Rosa González Hautamäki, Md Sahidullah, Tomi Kinnunen

Shortcut learning, or `Clever Hans effect` refers to situations where a learning agent (e. g., deep neural networks) learns spurious correlations present in data, resulting in biased models.

Multi-Dataset Co-Training with Sharpness-Aware Optimization for Audio Anti-spoofing

1 code implementation31 May 2023 Hye-jin Shim, Jee-weon Jung, Tomi Kinnunen

Audio anti-spoofing for automatic speaker verification aims to safeguard users' identities from spoofing attacks.

Speaker Verification

Towards single integrated spoofing-aware speaker verification embeddings

1 code implementation30 May 2023 Sung Hwan Mun, Hye-jin Shim, Hemlata Tak, Xin Wang, Xuechen Liu, Md Sahidullah, Myeonghun Jeong, Min Hyun Han, Massimiliano Todisco, Kong Aik Lee, Junichi Yamagishi, Nicholas Evans, Tomi Kinnunen, Nam Soo Kim, Jee-weon Jung

Second, competitive performance should be demonstrated compared to the fusion of automatic speaker verification (ASV) and countermeasure (CM) embeddings, which outperformed single embedding solutions by a large margin in the SASV2022 challenge.

Speaker Verification

Extended U-Net for Speaker Verification in Noisy Environments

1 code implementation27 Jun 2022 Ju-ho Kim, Jungwoo Heo, Hye-jin Shim, Ha-Jin Yu

Background noise is a well-known factor that deteriorates the accuracy and reliability of speaker verification (SV) systems by blurring speech intelligibility.

Denoising Speaker Identification +1

SASV 2022: The First Spoofing-Aware Speaker Verification Challenge

no code implementations28 Mar 2022 Jee-weon Jung, Hemlata Tak, Hye-jin Shim, Hee-Soo Heo, Bong-Jin Lee, Soo-Whan Chung, Ha-Jin Yu, Nicholas Evans, Tomi Kinnunen

Pre-trained spoofing detection and speaker verification models are provided as open source and are used in two baseline SASV solutions.

Speaker Verification

RawNeXt: Speaker verification system for variable-duration utterances with deep layer aggregation and extended dynamic scaling policies

1 code implementation15 Dec 2021 Ju-ho Kim, Hye-jin Shim, Jungwoo Heo, Ha-Jin Yu

Despite achieving satisfactory performance in speaker verification using deep neural networks, variable-duration utterances remain a challenge that threatens the robustness of systems.

Speaker Verification

Attentive max feature map and joint training for acoustic scene classification

no code implementations15 Apr 2021 Hye-jin Shim, Jee-weon Jung, Ju-ho Kim, Ha-Jin Yu

Furthermore, adopting the proposed attentive max feature map, our team placed fourth in the recent DCASE 2021 challenge.

Acoustic Scene Classification Multi-Task Learning +1

Learning Metrics from Mean Teacher: A Supervised Learning Method for Improving the Generalization of Speaker Verification System

no code implementations14 Apr 2021 Ju-ho Kim, Hye-jin Shim, Jee-weon Jung, Ha-Jin Yu

By learning the reliable intermediate representation of the mean teacher network, we expect that the proposed method can explore more discriminatory embedding spaces and improve the generalization performance of the speaker verification system.

Speaker Verification

DCASENET: A joint pre-trained deep neural network for detecting and classifying acoustic scenes and events

1 code implementation21 Sep 2020 Jee-weon Jung, Hye-jin Shim, Ju-ho Kim, Ha-Jin Yu

Single task deep neural networks that perform a target task among diverse cross-related tasks in the acoustic scene and event literature are being developed.

Acoustic Scene Classification Audio Tagging +3

Capturing scattered discriminative information using a deep architecture in acoustic scene classification

no code implementations9 Jul 2020 Hye-jin Shim, Jee-weon Jung, Ju-ho Kim, Ha-Jin Yu

Various experiments are conducted using the detection and classification of acoustic scenes and events 2020 task1-a dataset to validate the proposed methods.

Acoustic Scene Classification General Classification +1

Integrated Replay Spoofing-aware Text-independent Speaker Verification

no code implementations10 Jun 2020 Hye-jin Shim, Jee-weon Jung, Ju-ho Kim, Seung-bin Kim, Ha-Jin Yu

In this paper, we propose two approaches for building an integrated system of speaker verification and presentation attack detection: an end-to-end monolithic approach and a back-end modular approach.

Multi-Task Learning Speaker Identification +1

Segment Aggregation for short utterances speaker verification using raw waveforms

1 code implementation7 May 2020 Seung-bin Kim, Jee-weon Jung, Hye-jin Shim, Ju-ho Kim, Ha-Jin Yu

The proposed method segments an input utterance into several short utterances and then aggregates the segment embeddings extracted from the segmented inputs to compose a speaker embedding.

Speaker Verification

Improved RawNet with Feature Map Scaling for Text-independent Speaker Verification using Raw Waveforms

2 code implementations1 Apr 2020 Jee-weon Jung, Seung-bin Kim, Hye-jin Shim, Ju-ho Kim, Ha-Jin Yu

Recent advances in deep learning have facilitated the design of speaker verification systems that directly input raw waveforms.

Text-Independent Speaker Verification

Self-supervised pre-training with acoustic configurations for replay spoofing detection

no code implementations22 Oct 2019 Hye-jin Shim, Hee-Soo Heo, Jee-weon Jung, Ha-Jin Yu

Constructing a dataset for replay spoofing detection requires a physical process of playing an utterance and re-recording it, presenting a challenge to the collection of large-scale datasets.

Speaker Verification

Cosine similarity-based adversarial process

no code implementations1 Jul 2019 Hee-Soo Heo, Jee-weon Jung, Hye-jin Shim, IL-Ho Yang, Ha-Jin Yu

In particular, the adversarial process degrades the performance of the subsidiary model by eliminating the subsidiary information in the input which, in assumption, may degrade the performance of the primary model.

Speaker Identification

Replay attack detection with complementary high-resolution information using end-to-end DNN for the ASVspoof 2019 Challenge

1 code implementation23 Apr 2019 Jee-weon Jung, Hye-jin Shim, Hee-Soo Heo, Ha-Jin Yu

To detect unrevealed characteristics that reside in a replayed speech, we directly input spectrograms into an end-to-end DNN without knowledge-based intervention.

RawNet: Advanced end-to-end deep neural network using raw waveforms for text-independent speaker verification

4 code implementations17 Apr 2019 Jee-weon Jung, Hee-Soo Heo, Ju-ho Kim, Hye-jin Shim, Ha-Jin Yu

In this study, we explore end-to-end deep neural networks that input raw waveforms to improve various aspects: front-end speaker embedding extraction including model architecture, pre-training scheme, additional objective functions, and back-end classification.

Classification Data Augmentation +2

Short utterance compensation in speaker verification via cosine-based teacher-student learning of speaker embeddings

no code implementations25 Oct 2018 Jee-weon Jung, Hee-Soo Heo, Hye-jin Shim, Ha-Jin Yu

The short duration of an input utterance is one of the most critical threats that degrade the performance of speaker verification systems.

Text-Independent Speaker Verification

Replay spoofing detection system for automatic speaker verification using multi-task learning of noise classes

no code implementations29 Aug 2018 Hye-jin Shim, Jee-weon Jung, Hee-Soo Heo, Sung-Hyun Yoon, Ha-Jin Yu

We explore the effectiveness of training a deep neural network simultaneously for replay attack spoofing detection and replay noise classification.

General Classification Multi-Task Learning +1

Cannot find the paper you are looking for? You can Submit a new open access paper.