Abstract: Voice authentication has been widely used on smartphones. However, it remains vulnerable to spoofing attacks, where the attacker replays recorded voice samples from authentic humans using ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results