ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech
dc.contributor.affiliation | National Institute of Informatics - Wang, Xin | |
dc.contributor.affiliation | Nuance Communications Inc - Delgado, Héctor | |
dc.contributor.affiliation | Pindrop - Tak, Hemlata | |
dc.contributor.affiliation | Apple - Jung, Jee-weon | |
dc.contributor.affiliation | Carnegie Mellon University - Shim, Hyejin | |
dc.contributor.affiliation | EURECOM - Todisco, Massimiliano | |
dc.contributor.affiliation | KLASS - Kukanov, Ivan | |
dc.contributor.affiliation | National Institute of Informatics - Liu, Xuechen | |
dc.contributor.affiliation | TCG Crest - Sahidullah, Md | |
dc.contributor.affiliation | University of Eastern Finland - Kinnunen, Tomi | |
dc.contributor.affiliation | EURECOM - Evans, Nicholas | |
dc.contributor.affiliation | The Hong Kong Polytechnic University - Lee, Kong Aik | |
dc.contributor.affiliation | National Institute of Informatics - Yamagishi, Junichi | |
dc.contributor.affiliation | Seoul National University - Jeong, Myeonghun | |
dc.contributor.affiliation | University of Rochester - Zhu, Ge | |
dc.contributor.affiliation | University of Rochester - Zang, Yongyi | |
dc.contributor.affiliation | University of Rochester - Zhang, Neil | |
dc.contributor.affiliation | Carnegie Mellon University - Maiti, Soumi | |
dc.contributor.affiliation | University of Stuttgart - Lux, Florian | |
dc.contributor.affiliation | Fraunhofer Institute for Applied and Integrated Security - Muller, Nicolas | |
dc.contributor.affiliation | Shanghai Jiao Tong University - Zhang, Wangyou | |
dc.contributor.affiliation | University at Buffalo - Sun, Chengzhe | |
dc.contributor.affiliation | University at Buffalo - Hou, Shuwei | |
dc.contributor.affiliation | University at Buffalo - Lyu, Siwei | |
dc.contributor.affiliation | University of Helsinki - Le Maguer, Sebastien | |
dc.contributor.affiliation | Tianjin University - Gong, Cheng | |
dc.contributor.affiliation | University of Science and Technology of China - Guo, Hanjie | |
dc.contributor.affiliation | University of Science and Technology of China - Chen, Liping | |
dc.contributor.affiliation | University of Eastern Finland - Singh, Vishwanath | |
dc.contributor.author | Wang, Xin | |
dc.contributor.author | Delgado, Héctor | |
dc.contributor.author | Tak, Hemlata | |
dc.contributor.author | Jung, Jee-weon | |
dc.contributor.author | Shim, Hyejin | |
dc.contributor.author | Todisco, Massimiliano | |
dc.contributor.author | Kukanov, Ivan | |
dc.contributor.author | Liu, Xuechen | |
dc.contributor.author | Sahidullah, Md | |
dc.contributor.author | Kinnunen, Tomi | |
dc.contributor.author | Evans, Nicholas | |
dc.contributor.author | Lee, Kong Aik | |
dc.contributor.author | Yamagishi, Junichi | |
dc.contributor.author | Jeong, Myeonghun | |
dc.contributor.author | Zhu, Ge | |
dc.contributor.author | Zang, Yongyi | |
dc.contributor.author | Zhang, Neil | |
dc.contributor.author | Maiti, Soumi | |
dc.contributor.author | Lux, Florian | |
dc.contributor.author | Muller, Nicolas | |
dc.contributor.author | Zhang, Wangyou | |
dc.contributor.author | Sun, Chengzhe | |
dc.contributor.author | Hou, Shuwei | |
dc.contributor.author | Lyu, Siwei | |
dc.contributor.author | Le Maguer, Sebastien | |
dc.contributor.author | Gong, Cheng | |
dc.contributor.author | Guo, Hanjie | |
dc.contributor.author | Chen, Liping | |
dc.contributor.author | Singh, Vishwanath | |
dc.date.accessioned | 2025-03-24T15:26:51Z | |
dc.date.issued | 2024-12-18 | |
dc.date.issued | 2024-12-18 | |
dc.description | This is the Zenodo repository for the ASVspoof 5 database. ASVspoof 5 is the fifth edition in a series of challenges which promote the study of speech spoofing and deepfake attacks, and the design of detection solutions. Compared to previous challenges, the ASVspoof~5 database is built from crowdsourced data collected from around 2,000 speakers in diverse acoustic conditions. More than 20 attacks, also crowdsourced, are generated and optionally tested using surrogate detection models, while seven adversarial attacks are incorporated for the first time. Please check README.txt and LICENSE.txt before downloading the database. Database paper (to be submitted): https://arxiv.org/abs/2502.08857 Please consider citing the reference listed at the bottom of this page. It is highly recommended to follow the rules and instructions in the ASVspoof 5 challenge evaluation plan (phase 2, https://www.asvspoof.org/), if you want to produce results comparable with the literature. Latest work using the ASVspoof 5 database can be found in the Automatic Speaker Verification Spoofing Countermeasures Workshop proceeding: https://www.isca-archive.org/asvspoof_2024/index.html If you are interested in creating spoofed data for research purpose using the ASVspoof 5 protocol, please send request to info@asvspoof.org | |
dc.identifier | https://doi.org/10.5281/zenodo.14498691 | |
dc.identifier.uri | https://hydatakatalogi-test-24.it.helsinki.fi/handle/123456789/11605 | |
dc.rights | Open | |
dc.rights.license | odc-by | |
dc.subject | anti-spoofing | |
dc.subject | presentation attack detection | |
dc.subject | speech deepfake detection | |
dc.title | ASVspoof 5: Design, Collection and Validation of Resources for Spoofing, Deepfake, and Adversarial Attack Detection Using Crowdsourced Speech | |
dc.type | dataset | |
dc.type | dataset |