[HTML][HTML] Deep learning in the construction industry: A review of present status and future innovations

TD Akinosho, LO Oyedele, M Bilal, AO Ajayi… - Journal of Building …, 2020 - Elsevier
The construction industry is known to be overwhelmed with resource planning, risk
management and logistic challenges which often result in design defects, project delivery …

An overview of voice conversion and its challenges: From statistical modeling to deep learning

B Sisman, J Yamagishi, S King… - IEEE/ACM Transactions …, 2020 - ieeexplore.ieee.org
Speaker identity is one of the important characteristics of human speech. In voice
conversion, we change the speaker identity from one to another, while keeping the linguistic …

[HTML][HTML] Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and way forward

M Masood, M Nawaz, KM Malik, A Javed, A Irtaza… - Applied …, 2023 - Springer
Easy access to audio-visual content on social media, combined with the availability of
modern tools such as Tensorflow or Keras, and open-source trained models, along with …

A survey on voice assistant security: Attacks and countermeasures

C Yan, X Ji, K Wang, Q Jiang, Z Jin, W Xu - ACM Computing Surveys, 2022 - dl.acm.org
Voice assistants (VA) have become prevalent on a wide range of personal devices such as
smartphones and smart speakers. As companies build voice assistants with extra …

Speaker anonymization using x-vector and neural waveform models

F Fang, X Wang, J Yamagishi, I Echizen… - arXiv preprint arXiv …, 2019 - arxiv.org
The social media revolution has produced a plethora of web services to which users can
easily upload and share multimedia documents. Despite the popularity and convenience of …

Light convolutional neural network with feature genuinization for detection of synthetic speech attacks

Z Wu, RK Das, J Yang, H Li - arXiv preprint arXiv:2009.09637, 2020 - arxiv.org
Modern text-to-speech (TTS) and voice conversion (VC) systems produce natural sounding
speech that questions the security of automatic speaker verification (ASV). This makes …

Advances in anti-spoofing: from the perspective of ASVspoof challenges

MR Kamble, HB Sailor, HA Patil, H Li - APSIPA Transactions on …, 2020 - cambridge.org
In recent years, automatic speaker verification (ASV) is used extensively for voice biometrics.
This leads to an increased interest to secure these voice biometric systems for real-world …

Creating, using, misusing, and detecting deep fakes

H Farid - Journal of Online Trust and Safety, 2022 - tsjournal.org
Synthetic media—so-called deep fakes—have captured the imagination of some and struck
fear in others. Although they vary in their form and creation, deep fakes refer to text, image …

End-to-end text-to-speech for low-resource languages by cross-lingual transfer learning

T Tu, YJ Chen, C Yeh, HY Lee - arXiv preprint arXiv:1904.06508, 2019 - arxiv.org
End-to-end text-to-speech (TTS) has shown great success on large quantities of paired text
plus speech data. However, laborious data collection remains difficult for at least 95% of the …

Who are you (i really wanna know)? detecting audio {DeepFakes} through vocal tract reconstruction

L Blue, K Warren, H Abdullah, C Gibson… - 31st USENIX Security …, 2022 - usenix.org
Generative machine learning models have made convincing voice synthesis a reality. While
such tools can be extremely useful in applications where people consent to their voices …