[AUDITORY] Call for Papers: Special issue on Advances in Automatic Speaker Verification Anti-spoofing (Md Sahidullah )


Subject: [AUDITORY] Call for Papers: Special issue on Advances in Automatic Speaker Verification Anti-spoofing
From:    Md Sahidullah  <sahidullahmd@xxxxxxxx>
Date:    Fri, 17 May 2019 09:33:26 +0200
List-Archive:<http://lists.mcgill.ca/scripts/wa.exe?LIST=AUDITORY>

--0000000000009d03c405891066e5 Content-Type: text/plain; charset="UTF-8" [Apologies for possible cross-posting] Computer Speech and Language Special issue on Advances in Automatic Speaker Verification Anti-spoofing ( https://www.journals.elsevier.com/computer-speech-and-language/call-for-papers/advances-in-automatic-speaker ) The performance of voice biometrics systems based on automatic speaker verification (ASV) technology degrades significantly in the presence of spoofing attacks. Over the past few years considerable progress has been made in the field of ASV anti-spoofing. This includes the development of new speech corpora, common evaluation protocols and advancements in front-end feature extraction and back-end classifiers. The ASVspoof initiative was launched to promote the development of countermeasures which aim to protect ASV from spoofing attacks. ASVspoof 2015, the first edition, focused on the detection of synthetic speech created with voice conversion (VC) and text-to-speech (TTS) methods. The second edition, ASVspoof 2017, focused on the detection of replayed speech. ASVspoof 2019, the latest edition included two sub-challenges geared towards "logical access" (LA) and "physical access" (PA) scenarios. The LA scenario relates to the detection of synthetic speech created with advanced VC and TTS methods developed by academic and non-academic organizations. The PA scenario promotes the develop of countermeasures for the detection of replayed speech signals. More than 60 academic and industrial teams participated in the ASVspoof 2019 challenge. Preliminary results indicate considerable performance improvements in terms of two evaluation metrics adopted for the challenge. The top-ranking teams applied different machine learning algorithms suitable for the discrimination of natural and spoofed speech. This special issue will feature articles describing top-performing techniques and detailed analyses of some of the systems reported in recent years by leading anti-spoofing researchers. The special issue will also consist of an overview article which covers ASVspoof 2019 challenge results, and meta analyses. The scope of the special issue is, however, not limited to work performed using the ASVspoof challenge datasets; studies conducted with other datasets are also welcome. Please contact at info@xxxxxxxx if you have any questions about the relevance of your work for this special issue. Topics of interest include (but are not limited to): -Speaker verification anti-spoofing on ASVspoof 2019 -Datasets for speaker verification anti-spoofing -Deep learning for spoofing and anti-spoofing -Joint evaluation of countermeasures and speaker verification -Evaluation methodology for speaker verification anti-spoofing -Voice conversion for spoofing speaker verification systems -Text-to-speech for spoofing speaker verification systems -Robust spoofing countermeasures -Generalized spoofing countermeasures -Audio watermarking for spoofing countermeasures -Acoustic fingerprinting for spoofing countermeasures -Knowledge-based approaches for spoofing countermeasures -Open source toolkit for speaker verification anti-spoofing Important Dates: Submission open: June 1, 2019 Submission deadline: September 30, 2019 Acceptance deadline: February 10, 2020 Publication: March, 2020 Guest Editors: Andreas Nautsch, EURECOM, France Hector Delgado, Nuance Communications, Spain Massimiliano Todisco, EURECOM, France Md Sahidullah, Inria, France Ville Vestman, UEF, Finland Xin Wang, NII, Japan Advisory Committee: Junichi Yamagishi, NII, Japan Kong-Aik Lee, NEC Corp, Japan Nicolas Evans, EURCOM, France Tomi Kinnunen, UEF, Finland --0000000000009d03c405891066e5 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable <div dir=3D"ltr"><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica= ,sans-serif;font-size:16px;background-color:rgb(252,253,254)">[Apologies fo= r possible cross-posting]</div><br style=3D"color:rgb(0,0,0);font-family:ar= ial,helvetica,sans-serif;font-size:16px;background-color:rgb(252,253,254)">= <div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-= size:16px;background-color:rgb(252,253,254)">Computer Speech and Language S= pecial issue on Advances in Automatic Speaker Verification Anti-spoofing=C2= =A0</div><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-se= rif;font-size:16px;background-color:rgb(252,253,254)">(<span class=3D"gmail= -Object" id=3D"gmail-OBJ_PREFIX_DWT49_com_zimbra_url" style=3D"color:rgb(68= ,101,111)"><a target=3D"_blank" href=3D"https://www.journals.elsevier.com/c= omputer-speech-and-language/call-for-papers/advances-in-automatic-speaker" = style=3D"color:rgb(68,101,111);text-decoration-line:none">https://www.journ= als.elsevier.com/computer-speech-and-language/call-for-papers/advances-in-a= utomatic-speaker</a></span>)</div><br style=3D"color:rgb(0,0,0);font-family= :arial,helvetica,sans-serif;font-size:16px;background-color:rgb(252,253,254= )"><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;fo= nt-size:16px;background-color:rgb(252,253,254)">The performance of voice bi= ometrics systems based on automatic speaker verification (ASV) technology d= egrades significantly in the presence of spoofing attacks. Over the past fe= w years considerable progress has been made in the field of ASV anti-spoofi= ng. This includes the development of new speech corpora, common evaluation = protocols and advancements in front-end feature extraction and back-end cla= ssifiers. The ASVspoof initiative was launched to promote the development o= f countermeasures which aim to protect ASV from spoofing attacks. ASVspoof = 2015, the first edition, focused on the detection of synthetic speech creat= ed with voice conversion (VC) and text-to-speech (TTS) methods. The second = edition, ASVspoof 2017, focused on the detection of replayed speech.</div><= br style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-si= ze:16px;background-color:rgb(252,253,254)"><div style=3D"color:rgb(0,0,0);f= ont-family:arial,helvetica,sans-serif;font-size:16px;background-color:rgb(2= 52,253,254)">ASVspoof 2019, the latest edition included two sub-challenges = geared towards &quot;logical access&quot; (LA) and &quot;physical access&qu= ot; (PA) scenarios. The LA scenario relates to the detection of synthetic s= peech created with advanced VC and TTS methods developed by academic and no= n-academic organizations. The PA scenario promotes the develop of counterme= asures for the detection of replayed speech signals. More than 60 academic = and industrial teams participated in the ASVspoof 2019 challenge. Prelimina= ry results indicate considerable performance improvements in terms of two e= valuation metrics adopted for the challenge. The top-ranking teams applied = different machine learning algorithms suitable for the discrimination of na= tural and spoofed speech.</div><br style=3D"color:rgb(0,0,0);font-family:ar= ial,helvetica,sans-serif;font-size:16px;background-color:rgb(252,253,254)">= <div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-= size:16px;background-color:rgb(252,253,254)">This special issue will featur= e articles describing top-performing techniques and detailed analyses of so= me of the systems reported in recent years by leading anti-spoofing researc= hers. The special issue will also consist of an overview article which cove= rs ASVspoof 2019 challenge results, and meta analyses. The scope of the spe= cial issue is, however, not limited to work performed using the ASVspoof ch= allenge datasets; studies conducted with other datasets are also welcome.</= div><br style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;fo= nt-size:16px;background-color:rgb(252,253,254)"><div style=3D"color:rgb(0,0= ,0);font-family:arial,helvetica,sans-serif;font-size:16px;background-color:= rgb(252,253,254)">Please contact at=C2=A0<span class=3D"gmail-Object" id=3D= "gmail-OBJ_PREFIX_DWT50_ZmEmailObjectHandler" style=3D"color:rgb(68,101,111= )"><a href=3D"mailto:info@xxxxxxxx">info@xxxxxxxx</a></span>=C2=A0i= f you have any questions about the relevance of your work for this special = issue.</div><br style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-= serif;font-size:16px;background-color:rgb(252,253,254)"><div style=3D"color= :rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-size:16px;backgroun= d-color:rgb(252,253,254)">Topics of interest include (but are not limited t= o):</div><br style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-ser= if;font-size:16px;background-color:rgb(252,253,254)"><div style=3D"color:rg= b(0,0,0);font-family:arial,helvetica,sans-serif;font-size:16px;background-c= olor:rgb(252,253,254)">-Speaker verification anti-spoofing on ASVspoof 2019= =C2=A0</div><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans= -serif;font-size:16px;background-color:rgb(252,253,254)">-Datasets for spea= ker verification anti-spoofing=C2=A0</div><div style=3D"color:rgb(0,0,0);fo= nt-family:arial,helvetica,sans-serif;font-size:16px;background-color:rgb(25= 2,253,254)">-Deep learning for spoofing and anti-spoofing=C2=A0=C2=A0</div>= <div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-= size:16px;background-color:rgb(252,253,254)">-Joint evaluation of counterme= asures and speaker verification=C2=A0=C2=A0</div><div style=3D"color:rgb(0,= 0,0);font-family:arial,helvetica,sans-serif;font-size:16px;background-color= :rgb(252,253,254)">-Evaluation methodology for speaker verification anti-sp= oofing=C2=A0=C2=A0</div><div style=3D"color:rgb(0,0,0);font-family:arial,he= lvetica,sans-serif;font-size:16px;background-color:rgb(252,253,254)">-Voice= conversion for spoofing speaker verification systems=C2=A0=C2=A0</div><div= style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-size= :16px;background-color:rgb(252,253,254)">-Text-to-speech for spoofing speak= er verification systems=C2=A0=C2=A0</div><div style=3D"color:rgb(0,0,0);fon= t-family:arial,helvetica,sans-serif;font-size:16px;background-color:rgb(252= ,253,254)">-Robust spoofing countermeasures=C2=A0=C2=A0</div><div style=3D"= color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-size:16px;back= ground-color:rgb(252,253,254)">-Generalized spoofing countermeasures=C2=A0= =C2=A0</div><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans= -serif;font-size:16px;background-color:rgb(252,253,254)">-Audio watermarkin= g for spoofing countermeasures=C2=A0=C2=A0</div><div style=3D"color:rgb(0,0= ,0);font-family:arial,helvetica,sans-serif;font-size:16px;background-color:= rgb(252,253,254)">-Acoustic fingerprinting for spoofing countermeasures=C2= =A0</div><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-se= rif;font-size:16px;background-color:rgb(252,253,254)">-Knowledge-based appr= oaches for spoofing countermeasures=C2=A0</div><div style=3D"color:rgb(0,0,= 0);font-family:arial,helvetica,sans-serif;font-size:16px;background-color:r= gb(252,253,254)">-Open source toolkit for speaker verification anti-spoofin= g</div><br style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif= ;font-size:16px;background-color:rgb(252,253,254)"><div style=3D"color:rgb(= 0,0,0);font-family:arial,helvetica,sans-serif;font-size:16px;background-col= or:rgb(252,253,254)">Important Dates:</div><br style=3D"color:rgb(0,0,0);fo= nt-family:arial,helvetica,sans-serif;font-size:16px;background-color:rgb(25= 2,253,254)"><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans= -serif;font-size:16px;background-color:rgb(252,253,254)">Submission open:= =C2=A0<span class=3D"gmail-Object" id=3D"gmail-OBJ_PREFIX_DWT51_com_zimbra_= date" style=3D"color:rgb(68,101,111)">June 1</span>, 2019</div><div style= =3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-size:16px;= background-color:rgb(252,253,254)">Submission deadline:=C2=A0<span class=3D= "gmail-Object" id=3D"gmail-OBJ_PREFIX_DWT52_com_zimbra_date" style=3D"color= :rgb(68,101,111)">September 30</span>, 2019</div><div style=3D"color:rgb(0,= 0,0);font-family:arial,helvetica,sans-serif;font-size:16px;background-color= :rgb(252,253,254)">Acceptance deadline:=C2=A0<span class=3D"gmail-Object" i= d=3D"gmail-OBJ_PREFIX_DWT53_com_zimbra_date" style=3D"color:rgb(68,101,111)= ">February 10</span>, 2020</div><div style=3D"color:rgb(0,0,0);font-family:= arial,helvetica,sans-serif;font-size:16px;background-color:rgb(252,253,254)= ">Publication: March, 2020</div><br style=3D"color:rgb(0,0,0);font-family:a= rial,helvetica,sans-serif;font-size:16px;background-color:rgb(252,253,254)"= ><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font= -size:16px;background-color:rgb(252,253,254)">Guest Editors:</div><br style= =3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-size:16px;= background-color:rgb(252,253,254)"><div style=3D"color:rgb(0,0,0);font-fami= ly:arial,helvetica,sans-serif;font-size:16px;background-color:rgb(252,253,2= 54)">Andreas Nautsch, EURECOM, France</div><div style=3D"color:rgb(0,0,0);f= ont-family:arial,helvetica,sans-serif;font-size:16px;background-color:rgb(2= 52,253,254)">Hector Delgado, Nuance Communications, Spain</div><div style= =3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;font-size:16px;= background-color:rgb(252,253,254)">Massimiliano Todisco, EURECOM, France</d= iv><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;fo= nt-size:16px;background-color:rgb(252,253,254)">Md Sahidullah, Inria, Franc= e</div><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-seri= f;font-size:16px;background-color:rgb(252,253,254)">Ville Vestman, UEF, Fin= land</div><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-s= erif;font-size:16px;background-color:rgb(252,253,254)">Xin Wang, NII, Japan= </div><br style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sans-serif;= font-size:16px;background-color:rgb(252,253,254)"><div style=3D"color:rgb(0= ,0,0);font-family:arial,helvetica,sans-serif;font-size:16px;background-colo= r:rgb(252,253,254)">Advisory Committee:</div><br style=3D"color:rgb(0,0,0);= font-family:arial,helvetica,sans-serif;font-size:16px;background-color:rgb(= 252,253,254)"><div style=3D"color:rgb(0,0,0);font-family:arial,helvetica,sa= ns-serif;font-size:16px;background-color:rgb(252,253,254)">Junichi Yamagish= i, NII, Japan</div><div style=3D"color:rgb(0,0,0);font-family:arial,helveti= ca,sans-serif;font-size:16px;background-color:rgb(252,253,254)">Kong-Aik Le= e, NEC Corp, Japan</div><div style=3D"color:rgb(0,0,0);font-family:arial,he= lvetica,sans-serif;font-size:16px;background-color:rgb(252,253,254)">Nicola= s Evans, EURCOM, France</div><div style=3D"color:rgb(0,0,0);font-family:ari= al,helvetica,sans-serif;font-size:16px;background-color:rgb(252,253,254)">T= omi Kinnunen, UEF, Finland</div><br class=3D"gmail-Apple-interchange-newlin= e"><div dir=3D"ltr" class=3D"gmail_signature" data-smartmail=3D"gmail_signa= ture"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><div><di= v dir=3D"ltr"><div dir=3D"ltr"><div dir=3D"ltr"><div dir=3D"ltr"></div></di= v></div></div></div></div></div></div></div></div></div></div> --0000000000009d03c405891066e5--


This message came from the mail archive
src/postings/2019/
maintained by:
DAn Ellis <dpwe@ee.columbia.edu>
Electrical Engineering Dept., Columbia University