AASIST: Audio Anti-Spoofing Using Integrated Spectro-Temporal Graph Attention Networks
Citations Over TimeTop 1% of 2022 papers
Abstract
Artefacts that differentiate spoofed from bona-fide utterances can reside in specific temporal or spectral intervals. Their reliable detection usually depends upon computationally demanding ensemble systems where each subsystem is tuned to some specific artefacts. We seek to develop an efficient, single system that can detect a broad range of different spoofing attacks without score-level ensembles. We propose a novel heterogeneous stacking graph attention layer that models artefacts spanning heterogeneous temporal and spectral intervals with a heterogeneous attention mechanism and a stack node. With a new max graph operation that involves a competitive mechanism and a new readout scheme, our approach, named AASIST, outperforms the current state-of-the-art by 20% relative. Even a lightweight variant, AASIST-L, with only 85k parameters, outperforms all competing systems.
Related Papers
- → Spoofing and countermeasures for speaker verification: A survey(2014)589 cited
- Detection and Mitigation of Spoofing Attacks on a Vector-Based Tracking GPS Receiver(2012)
- → Stealthy GPS Spoofing: Spoofer Systems, Spoofing Techniques and Strategies(2020)31 cited
- → Research Progress of GNSS Spoofing and Spoofing Detection Technology(2019)28 cited
- → An Investigation about the Scalability of the Spoofing Detection System(2018)3 cited