Voiceprint recognition attack defense method based on cuckoo search algorithm
A cuckoo search and voiceprint recognition technology, applied in the field of deep learning algorithms and information security research, can solve problems such as adversarial sample attacks, achieve high privacy, reduce search space, and improve search efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The present invention will be further described in detail below with reference to the accompanying drawings and examples of the specification. It should be pointed out that the embodiments described below are intended to facilitate the understanding of the present invention and do not have any limiting effect on it.
[0029] Reference figure 1 with figure 2 , A voiceprint recognition attack defense method based on cuckoo search algorithm includes the following steps:
[0030] (1)Prepare the original audio data set: collect and preprocess the voice and audio of different speakers with different content, and divide it into a pre-training data set, a test data set and a disturbance data set used to generate adversarial samples according to a certain proportion. The specific process as follows.
[0031] Step1: Collect the audio that different speakers say certain content, that is, suppose there are a total of M different speakers and N different speaking content, then each sampl...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com