Research Article
Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference
Table 1
The SR of spoofing attack. SR1 aims at LDA classification and SR2 aims at cosine similarity threshold classification. C1 represents the generalized relevancy based attack and C2 represents the multifactor based attack.
|