no code implementations • 17 Nov 2023 • Xiaojiao Chen, Sheng Li, Jiyi Li, Hao Huang, Yang Cao, Liang He
This paper demonstrates that an attacker can extract speaker information by querying speaker-adapted speech recognition (ASR) systems.
no code implementations • 17 Nov 2023 • Xiaojiao Chen, Sheng Li, Jiyi Li, Hao Huang, Yang Cao, Liang He
Current speaker anonymization methods, especially with self-supervised learning (SSL) models, require massive computational resources when hiding speaker identity.