Research Article

Towards Generating Adversarial Examples on Combined Systems of Automatic Speaker Verification and Spoofing Countermeasure

Table 3

The performance of step-by-step adversarial attack.

SystemASV ⟶ CMCM ⟶ ASVJoint

FAR (%)63.834.496.7
t-DCF0.8230.2561.000