Research Article
Towards Generating Adversarial Examples on Combined Systems of Automatic Speaker Verification and Spoofing Countermeasure
Table 4
Trial analysis of step-by-step attack. The number of trials labeled target, nontarget, and spoof accepted by systems is shown in the table.
|