Research Article

Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference

Figure 6

Signal noise rate for generalized relevancy based attack and multifactor based attack during the procession of generation.