Machine Learning Mitigants for Speech Based Cyber Risk

نویسندگان

چکیده

Statistical analysis of speech is an emerging area machine learning. In this paper, we tackle the biometric challenge Automatic Speaker Verification (ASV) differentiating between samples generated by two distinct populations utterances, those authentic human voice and a synthetic one. Solving such issue through statistical perspective foresees definition decision rule function learning procedure to identify optimal classifier. Classical state-of-the-art countermeasures rely on strong assumptions as stationarity or local-stationarity that may be atypical encounter in practice. We explore regard robust non-linear non-stationary signal decomposition method known Empirical Mode Decomposition combined with Mel-Frequency Cepstral Coefficients novel fashion refined classifier technique multi-kernel Support Vector machine. undertake significant real data case studies covering multiple ASV systems using different datasets, including ASVSpoof 2019 database. The obtained results overwhelmingly demonstrate significance our feature extraction approach versus existing conventional methods reducing threat cyber-attack perpetrated replication seeking unauthorised access.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

Distributed Machine Learning for Cyber-Physical Systems

Wireless sensor networks (WSN) are increasingly used for environmental monitoring over extended periods of time. To facilitate deployments in remote areas, sensor nodes are typically small, solar-powered devices with limited computational capabilities. Over the duration of the deployment, harsh weather conditions can lead to problems like mis-calibration or build-up of dust on sensors and solar...

متن کامل

cyber risk exposure and prospects for cyber insurance

this study draws attention to the ubiquitous and borderless nature of cybercrime. it examines the prospect of introducing customized cyber insurance policy in the nigerian market. as secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four trade groups that rely heavily on internet transactions for...

متن کامل

Anticipating Cyber Vulnerability Exploits Using Machine Learning

| @RecordedFuture Every day about 20 new cyber vulnerabilities are released and reported, and these are related to various software implementation weaknesses. Hackers exploit these vulnerabilities to launch an attack, trigger a system failure, access sensitive information, or gain remote system access. Some vulnerabilities have a severe impact, while hackers show little or no interest in exploi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3117080