Skip to main content

Table 2 Classification of speakers for target selection to attack ASV system. After [12, 16]

From: Vulnerability issues in Automatic Speaker Verification (ASV) systems