Skip to main content

Showing 1–8 of 8 results for author: Chettri, B

.
  1. arXiv:2107.13450  [pdf

    physics.app-ph cond-mat.mtrl-sci

    Carbon and Boron Nitride nanostructures for Hydrogen storage applications through a theoretical perspective

    Authors: Y. T. Singh, B. Chettri, A. Banik, K. O. Obodo, D. P. Rai

    Abstract: The recent progress in the field of hydrogen storage in carbon and boron nitride nanostructures has been summarized. Carbon and boron nitride nanostructures are considered advantageous in this prospect due to their lightweight and high surface area. Demerits of pristine structures to hold hydrogen molecules for mobile applications have been highlighted by many researchers. In such cases, weak van… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

  2. arXiv:2103.14602  [pdf, other

    eess.AS cs.CV cs.LG cs.SD

    Data Quality as Predictor of Voice Anti-Spoofing Generalization

    Authors: Bhusan Chettri, Rosa González Hautamäki, Md Sahidullah, Tomi Kinnunen

    Abstract: Voice anti-spoofing aims at classifying a given utterance either as a bonafide human sample, or a spoofing attack (e.g. synthetic or replayed sample). Many anti-spoofing methods have been proposed but most of them fail to generalize across domains (corpora) -- and we do not know \emph{why}. We outline a novel interpretative framework for gauging the impact of data quality upon anti-spoofing perfor… ▽ More

    Submitted 21 June, 2021; v1 submitted 26 March, 2021; originally announced March 2021.

    Comments: INTERSPEECH 2021

  3. arXiv:2010.07913  [pdf, other

    eess.AS cs.SD

    Dataset artefacts in anti-spoofing systems: a case study on the ASVspoof 2017 benchmark

    Authors: Bhusan Chettri, Emmanouil Benetos, Bob L. T. Sturm

    Abstract: The Automatic Speaker Verification Spoofing and Countermeasures Challenges motivate research in protecting speech biometric systems against a variety of different access attacks. The 2017 edition focused on replay spoofing attacks, and involved participants building and training systems on a provided dataset (ASVspoof 2017). More than 60 research papers have so far been published with this dataset… ▽ More

    Submitted 15 October, 2020; originally announced October 2020.

    Comments: Accepted to IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2020

  4. arXiv:2004.01922  [pdf, other

    eess.AS

    Subband modeling for spoofing detection in automatic speaker verification

    Authors: Bhusan Chettri, Tomi Kinnunen, Emmanouil Benetos

    Abstract: Spectrograms - time-frequency representations of audio signals - have found widespread use in neural network-based spoofing detection. While deep models are trained on the fullband spectrum of the signal, we argue that not all frequency bands are useful for these tasks. In this paper, we systematically investigate the impact of different subbands and their importance on replay spoofing detection o… ▽ More

    Submitted 4 April, 2020; originally announced April 2020.

    Comments: Accepted to the Speaker Odyssey (The Speaker and Language Recognition Workshop) 2020 conference. 8 pages

  5. arXiv:2003.09611  [pdf

    cond-mat.mtrl-sci cond-mat.dis-nn

    Induced Ferromagnetism in bilayer Hexagonal Boron Nitride (h-BN) on vacancy defects at B and N sites

    Authors: B. Chettri, P. K. Patra, Tuan V. Vu, Lalrinkima, Abu Yaya, Kingsley O. Obodo, Ngoc Thanh Thuy Tran, A. Laref, D. P. Rai

    Abstract: We investigated the electronic and optical properties of bilayer AB stacked Boron and Nitrogen vacancies in hexagonal Boron Nitride (h-BN) using density functional theory (DFT). The density of states (DOS) and electronic band structure showed that Boron vacancy in bilayer h-BN results in a magnetic and conducting ground state. The band gap energy ranges from 4.56 eV for the pristine BN bilayer to… ▽ More

    Submitted 21 March, 2020; originally announced March 2020.

  6. arXiv:2003.09542  [pdf, other

    eess.AS

    Deep Generative Variational Autoencoding for Replay Spoof Detection in Automatic Speaker Verification

    Authors: Bhusan Chettri, Tomi Kinnunen, Emmanouil Benetos

    Abstract: Automatic speaker verification (ASV) systems are highly vulnerable to presentation attacks, also called spoofing attacks. Replay is among the simplest attacks to mount - yet difficult to detect reliably. The generalization failure of spoofing countermeasures (CMs) has driven the community to study various alternative deep learning CMs. The majority of them are supervised approaches that learn a hu… ▽ More

    Submitted 20 March, 2020; originally announced March 2020.

    Comments: Accepted to Computer Speech and Language Special issue on Advances in Automatic Speaker Verification Anti-spoofing, 2020

  7. arXiv:1904.04589  [pdf, other

    eess.AS cs.SD

    Ensemble Models for Spoofing Detection in Automatic Speaker Verification

    Authors: Bhusan Chettri, Daniel Stoller, Veronica Morfi, Marco A. Martínez Ramírez, Emmanouil Benetos, Bob L. Sturm

    Abstract: Detecting spoofing attempts of automatic speaker verification (ASV) systems is challenging, especially when using only one modeling approach. For robustness, we use both deep neural networks and traditional machine learning models and combine them as ensemble models through logistic regression. They are trained to detect logical access (LA) and physical access (PA) attacks on the dataset released… ▽ More

    Submitted 4 July, 2019; v1 submitted 9 April, 2019; originally announced April 2019.

    Comments: Accepted at Interspeech 2019, Graz, Austria

  8. arXiv:1805.09164  [pdf, other

    eess.AS cs.SD

    A Study On Convolutional Neural Network Based End-To-End Replay Anti-Spoofing

    Authors: Bhusan Chettri, Saumitra Mishra, Bob L. Sturm, Emmanouil Benetos

    Abstract: The second Automatic Speaker Verification Spoofing and Countermeasures challenge (ASVspoof 2017) focused on "replay attack" detection. The best deep-learning systems to compete in ASVspoof 2017 used Convolutional Neural Networks (CNNs) as a feature extractor. In this paper, we study their performance in an end-to-end setting. We find that these architectures show poor generalization in the evaluat… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

    Comments: 6 pages