[AUDITORY] Call for Papers: Special issue on Advances in Automatic Speaker Verification Anti-spoofing (Md Sahidullah )


Subject: [AUDITORY] Call for Papers: Special issue on Advances in Automatic Speaker Verification Anti-spoofing
From:    Md Sahidullah  <sahidullahmd@xxxxxxxx>
Date:    Fri, 13 Sep 2019 01:20:57 +0200
List-Archive:<http://lists.mcgill.ca/scripts/wa.exe?LIST=AUDITORY>

--0000000000006a43920592636435 Content-Type: text/plain; charset="UTF-8" [Apologies for possible cross-posting] Computer Speech and Language Special issue on Advances in Automatic Speaker Verification Anti-spoofing ( https://www.journals.elsevier.com/computer-speech-and-language/call-for-papers/advances-in-automatic-speaker ) The performance of voice biometrics systems based on automatic speaker verification (ASV) technology degrades significantly in the presence of spoofing attacks. Over the past few years considerable progress has been made in the field of ASV anti-spoofing. This includes the development of new speech corpora, common evaluation protocols and advancements in front-end feature extraction and back-end classifiers. The ASVspoof initiative was launched to promote the development of countermeasures which aim to protect ASV from spoofing attacks. ASVspoof 2015, the first edition, focused on the detection of synthetic speech created with voice conversion (VC) and text-to-speech (TTS) methods. The second edition, ASVspoof 2017, focused on the detection of replayed speech. ASVspoof 2019, the latest edition included two sub-challenges geared towards "logical access" (LA) and "physical access" (PA) scenarios. The LA scenario relates to the detection of synthetic speech created with advanced VC and TTS methods developed by academic and non-academic organizations. The PA scenario promotes the develop of countermeasures for the detection of replayed speech signals. More than 60 academic and industrial teams participated in the ASVspoof 2019 challenge. Preliminary results indicate considerable performance improvements in terms of two evaluation metrics adopted for the challenge. The top-ranking teams applied different machine learning algorithms suitable for the discrimination of natural and spoofed speech. This special issue will feature articles describing top-performing techniques and detailed analyses of some of the systems reported in recent years by leading anti-spoofing researchers. The special issue will also consist of an overview article which covers ASVspoof 2019 challenge results, and meta analyses. The scope of the special issue is, however, not limited to work performed using the ASVspoof challenge datasets; studies conducted with other datasets are also welcome. Please contact at info@xxxxxxxx if you have any questions about the relevance of your work for this special issue. Topics of interest include (but are not limited to): -Speaker verification anti-spoofing on ASVspoof 2019 -Datasets for speaker verification anti-spoofing -Deep learning for spoofing and anti-spoofing -Joint evaluation of countermeasures and speaker verification -Evaluation methodology for speaker verification anti-spoofing -Voice conversion for spoofing speaker verification systems -Text-to-speech for spoofing speaker verification systems -Robust spoofing countermeasures -Generalized spoofing countermeasures -Audio watermarking for spoofing countermeasures -Acoustic fingerprinting for spoofing countermeasures -Knowledge-based approaches for spoofing countermeasures -Open source toolkit for speaker verification anti-spoofing Important Dates: Submission open: June 1, 2019 Submission deadline: September 30, 2019 Acceptance deadline: February 10, 2020 Publication: March, 2020 Guest Editors: Andreas Nautsch, EURECOM, France Hector Delgado, Nuance Communications, Spain Massimiliano Todisco, EURECOM, France Md Sahidullah, Inria, France Ville Vestman, UEF, Finland Xin Wang, NII, Japan Advisory Committee: Junichi Yamagishi, NII, Japan Kong-Aik Lee, NEC Corp, Japan Nicolas Evans, EURCOM, France Tomi Kinnunen, UEF, Finland -- Md Sahidullah website: *https://sites.google.com/site/iitkgpsahi/ <https://sites.google.com/site/iitkgpsahi/>* --0000000000006a43920592636435 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable <div dir=3D"ltr"><span style=3D"font-family:-moz-fixed;font-size:12px">[Apo= logies for possible cross-posting]=C2=A0</span><br style=3D"font-family:-mo= z-fixed;font-size:12px"><br style=3D"font-family:-moz-fixed;font-size:12px"= ><span style=3D"font-family:-moz-fixed;font-size:12px">Computer Speech and = Language Special issue on Advances in Automatic Speaker Verification Anti-s= poofing=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><sp= an style=3D"font-family:-moz-fixed;font-size:12px">(</span><a class=3D"gmai= l-m_3882863307072913508moz-txt-link-freetext" href=3D"https://www.journals.= elsevier.com/computer-speech-and-language/call-for-papers/advances-in-autom= atic-speaker" target=3D"_blank" style=3D"font-family:-moz-fixed;font-size:1= 2px">https://www.journals.elsevier.com/computer-speech-and-language/call-fo= r-papers/advances-in-automatic-speaker</a><span style=3D"font-family:-moz-f= ixed;font-size:12px">)=C2=A0</span><br style=3D"font-family:-moz-fixed;font= -size:12px"><br style=3D"font-family:-moz-fixed;font-size:12px"><span style= =3D"font-family:-moz-fixed;font-size:12px">The performance of voice biometr= ics systems based on automatic speaker verification (ASV) technology degrad= es significantly in the presence of spoofing attacks. Over the past few yea= rs considerable progress has been made in the field of ASV anti-spoofing. T= his includes the development of new speech corpora, common evaluation proto= cols and advancements in front-end feature extraction and back-end classifi= ers. The ASVspoof initiative was launched to promote the development of cou= ntermeasures which aim to protect ASV from spoofing attacks. ASVspoof 2015,= the first edition, focused on the detection of synthetic speech created wi= th voice conversion (VC) and text-to-speech (TTS) methods. The second editi= on, ASVspoof 2017, focused on the detection of replayed speech.=C2=A0</span= ><br style=3D"font-family:-moz-fixed;font-size:12px"><br style=3D"font-fami= ly:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-fixed;font-si= ze:12px">ASVspoof 2019, the latest edition included two sub-challenges gear= ed towards &quot;logical access&quot; (LA) and &quot;physical access&quot; = (PA) scenarios. The LA scenario relates to the detection of synthetic speec= h created with advanced VC and TTS methods developed by academic and non-ac= ademic organizations. The PA scenario promotes the develop of countermeasur= es for the detection of replayed speech signals. More than 60 academic and = industrial teams participated in the ASVspoof 2019 challenge. Preliminary r= esults indicate considerable performance improvements in terms of two evalu= ation metrics adopted for the challenge. The top-ranking teams applied diff= erent machine learning algorithms suitable for the discrimination of natura= l and spoofed speech.=C2=A0</span><br style=3D"font-family:-moz-fixed;font-= size:12px"><br style=3D"font-family:-moz-fixed;font-size:12px"><span style= =3D"font-family:-moz-fixed;font-size:12px">This special issue will feature = articles describing top-performing techniques and detailed analyses of some= of the systems reported in recent years by leading anti-spoofing researche= rs. The special issue will also consist of an overview article which covers= ASVspoof 2019 challenge results, and meta analyses. The scope of the speci= al issue is, however, not limited to work performed using the ASVspoof chal= lenge datasets; studies conducted with other datasets are also welcome.=C2= =A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><br style=3D"= font-family:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-fixe= d;font-size:12px">Please contact at=C2=A0</span><a class=3D"gmail-m_3882863= 307072913508moz-txt-link-abbreviated" href=3D"mailto:info@xxxxxxxx" tar= get=3D"_blank" style=3D"font-family:-moz-fixed;font-size:12px">info@xxxxxxxx= f.org</a><span style=3D"font-family:-moz-fixed;font-size:12px">=C2=A0if you= have any questions about the relevance of your work for this special issue= .=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><br style= =3D"font-family:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-= fixed;font-size:12px">Topics of interest include (but are not limited to):= =C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><br style= =3D"font-family:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-= fixed;font-size:12px">-Speaker verification anti-spoofing on ASVspoof 2019= =C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span styl= e=3D"font-family:-moz-fixed;font-size:12px">-Datasets for speaker verificat= ion anti-spoofing=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size= :12px"><span style=3D"font-family:-moz-fixed;font-size:12px">-Deep learning= for spoofing and anti-spoofing=C2=A0</span><br style=3D"font-family:-moz-f= ixed;font-size:12px"><span style=3D"font-family:-moz-fixed;font-size:12px">= -Joint evaluation of countermeasures and speaker verification=C2=A0</span><= br style=3D"font-family:-moz-fixed;font-size:12px"><span style=3D"font-fami= ly:-moz-fixed;font-size:12px">-Evaluation methodology for speaker verificat= ion anti-spoofing=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size= :12px"><span style=3D"font-family:-moz-fixed;font-size:12px">-Voice convers= ion for spoofing speaker verification systems=C2=A0</span><br style=3D"font= -family:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-fixed;fo= nt-size:12px">-Text-to-speech for spoofing speaker verification systems=C2= =A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span style= =3D"font-family:-moz-fixed;font-size:12px">-Robust spoofing countermeasures= =C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span styl= e=3D"font-family:-moz-fixed;font-size:12px">-Generalized spoofing counterme= asures=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><spa= n style=3D"font-family:-moz-fixed;font-size:12px">-Audio watermarking for s= poofing countermeasures=C2=A0</span><br style=3D"font-family:-moz-fixed;fon= t-size:12px"><span style=3D"font-family:-moz-fixed;font-size:12px">-Acousti= c fingerprinting for spoofing countermeasures=C2=A0</span><br style=3D"font= -family:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-fixed;fo= nt-size:12px">-Knowledge-based approaches for spoofing countermeasures=C2= =A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span style= =3D"font-family:-moz-fixed;font-size:12px">-Open source toolkit for speaker= verification anti-spoofing=C2=A0</span><br style=3D"font-family:-moz-fixed= ;font-size:12px"><br style=3D"font-family:-moz-fixed;font-size:12px"><span = style=3D"font-family:-moz-fixed;font-size:12px">Important Dates:=C2=A0</spa= n><br style=3D"font-family:-moz-fixed;font-size:12px"><br style=3D"font-fam= ily:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-fixed;font-s= ize:12px">Submission open: June 1, 2019=C2=A0</span><br style=3D"font-famil= y:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-fixed;font-siz= e:12px">Submission deadline: September 30, 2019=C2=A0</span><br style=3D"fo= nt-family:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-fixed;= font-size:12px">Acceptance deadline: February 10, 2020=C2=A0</span><br styl= e=3D"font-family:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz= -fixed;font-size:12px">Publication: March, 2020=C2=A0</span><br style=3D"fo= nt-family:-moz-fixed;font-size:12px"><br style=3D"font-family:-moz-fixed;fo= nt-size:12px"><span style=3D"font-family:-moz-fixed;font-size:12px">Guest E= ditors:=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><br= style=3D"font-family:-moz-fixed;font-size:12px"><span style=3D"font-family= :-moz-fixed;font-size:12px">Andreas Nautsch, EURECOM, France=C2=A0</span><b= r style=3D"font-family:-moz-fixed;font-size:12px"><span style=3D"font-famil= y:-moz-fixed;font-size:12px">Hector Delgado, Nuance Communications, Spain= =C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span styl= e=3D"font-family:-moz-fixed;font-size:12px">Massimiliano Todisco, EURECOM, = France=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><spa= n style=3D"font-family:-moz-fixed;font-size:12px">Md Sahidullah, Inria, Fra= nce=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span s= tyle=3D"font-family:-moz-fixed;font-size:12px">Ville Vestman, UEF, Finland= =C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span styl= e=3D"font-family:-moz-fixed;font-size:12px">Xin Wang, NII, Japan=C2=A0</spa= n><br style=3D"font-family:-moz-fixed;font-size:12px"><br style=3D"font-fam= ily:-moz-fixed;font-size:12px"><span style=3D"font-family:-moz-fixed;font-s= ize:12px">Advisory Committee:=C2=A0</span><br style=3D"font-family:-moz-fix= ed;font-size:12px"><br style=3D"font-family:-moz-fixed;font-size:12px"><spa= n style=3D"font-family:-moz-fixed;font-size:12px">Junichi Yamagishi, NII, J= apan=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span = style=3D"font-family:-moz-fixed;font-size:12px">Kong-Aik Lee, NEC Corp, Jap= an=C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span st= yle=3D"font-family:-moz-fixed;font-size:12px">Nicolas Evans, EURCOM, France= =C2=A0</span><br style=3D"font-family:-moz-fixed;font-size:12px"><span styl= e=3D"font-family:-moz-fixed;font-size:12px">Tomi Kinnunen, UEF, Finland</sp= an><div class=3D"gmail-yj6qo" style=3D"font-family:-moz-fixed;font-size:12p= x"></div><div class=3D"gmail-adL" style=3D"font-family:-moz-fixed;font-size= :12px"><br></div><div><br></div>-- <br><div dir=3D"ltr" class=3D"gmail_sign= ature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D= "ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><div dir=3D"ltr"><div dir= =3D"ltr"><div dir=3D"ltr"><font face=3D"comic sans ms, sans-serif" size=3D"= 2" color=3D"#000000">Md Sahidullah</font><div><font face=3D"comic sans ms, = sans-serif" size=3D"2" color=3D"#000000">website:=C2=A0</font><font color= =3D"#0000ee" face=3D"comic sans ms, sans-serif" size=3D"2"><u><a href=3D"ht= tps://sites.google.com/site/iitkgpsahi/" target=3D"_blank">https://sites.go= ogle.com/site/iitkgpsahi/</a></u></font></div></div></div></div></div></div= ></div></div></div></div></div></div></div> --0000000000006a43920592636435--


This message came from the mail archive
src/postings/2019/
maintained by:
DAn Ellis <dpwe@ee.columbia.edu>
Electrical Engineering Dept., Columbia University