<div dir="ltr"><span style="font-family:-moz-fixed;font-size:12px">[Apologies for possible cross-posting] </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Computer Speech and Language Special issue on Advances in Automatic Speaker Verification Anti-spoofing </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">(</span><a class="gmail-m_3882863307072913508moz-txt-link-freetext" href="https://www.journals.elsevier.com/computer-speech-and-language/call-for-papers/advances-in-automatic-speaker" target="_blank" style="font-family:-moz-fixed;font-size:12px">https://www.journals.elsevier.com/computer-speech-and-language/call-for-papers/advances-in-automatic-speaker</a><span style="font-family:-moz-fixed;font-size:12px">) </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">The performance of voice biometrics systems based on automatic speaker verification (ASV) technology degrades significantly in the presence of spoofing attacks. Over the past few years considerable progress has been made in the field of ASV anti-spoofing. This includes the development of new speech corpora, common evaluation protocols and advancements in front-end feature extraction and back-end classifiers. The ASVspoof initiative was launched to promote the development of countermeasures which aim to protect ASV from spoofing attacks. ASVspoof 2015, the first edition, focused on the detection of synthetic speech created with voice conversion (VC) and text-to-speech (TTS) methods. The second edition, ASVspoof 2017, focused on the detection of replayed speech. </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">ASVspoof 2019, the latest edition included two sub-challenges geared towards "logical access" (LA) and "physical access" (PA) scenarios. The LA scenario relates to the detection of synthetic speech created with advanced VC and TTS methods developed by academic and non-academic organizations. The PA scenario promotes the develop of countermeasures for the detection of replayed speech signals. More than 60 academic and industrial teams participated in the ASVspoof 2019 challenge. Preliminary results indicate considerable performance improvements in terms of two evaluation metrics adopted for the challenge. The top-ranking teams applied different machine learning algorithms suitable for the discrimination of natural and spoofed speech. </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">This special issue will feature articles describing top-performing techniques and detailed analyses of some of the systems reported in recent years by leading anti-spoofing researchers. The special issue will also consist of an overview article which covers ASVspoof 2019 challenge results, and meta analyses. The scope of the special issue is, however, not limited to work performed using the ASVspoof challenge datasets; studies conducted with other datasets are also welcome. </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Please contact at </span><a class="gmail-m_3882863307072913508moz-txt-link-abbreviated" href="mailto:info@asvspoof.org" target="_blank" style="font-family:-moz-fixed;font-size:12px">info@asvspoof.org</a><span style="font-family:-moz-fixed;font-size:12px"> if you have any questions about the relevance of your work for this special issue. </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Topics of interest include (but are not limited to): </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Speaker verification anti-spoofing on ASVspoof 2019 </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Datasets for speaker verification anti-spoofing </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Deep learning for spoofing and anti-spoofing </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Joint evaluation of countermeasures and speaker verification </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Evaluation methodology for speaker verification anti-spoofing </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Voice conversion for spoofing speaker verification systems </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Text-to-speech for spoofing speaker verification systems </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Robust spoofing countermeasures </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Generalized spoofing countermeasures </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Audio watermarking for spoofing countermeasures </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Acoustic fingerprinting for spoofing countermeasures </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Knowledge-based approaches for spoofing countermeasures </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">-Open source toolkit for speaker verification anti-spoofing </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Important Dates: </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Submission open: June 1, 2019 </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Submission deadline: September 30, 2019 </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Acceptance deadline: February 10, 2020 </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Publication: March, 2020 </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Guest Editors: </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Andreas Nautsch, EURECOM, France </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Hector Delgado, Nuance Communications, Spain </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Massimiliano Todisco, EURECOM, France </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Md Sahidullah, Inria, France </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Ville Vestman, UEF, Finland </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Xin Wang, NII, Japan </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Advisory Committee: </span><br style="font-family:-moz-fixed;font-size:12px"><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Junichi Yamagishi, NII, Japan </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Kong-Aik Lee, NEC Corp, Japan </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Nicolas Evans, EURCOM, France </span><br style="font-family:-moz-fixed;font-size:12px"><span style="font-family:-moz-fixed;font-size:12px">Tomi Kinnunen, UEF, Finland</span><div class="gmail-yj6qo" style="font-family:-moz-fixed;font-size:12px"></div><div class="gmail-adL" style="font-family:-moz-fixed;font-size:12px"><br></div><div><br></div>-- <br><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><font face="comic sans ms, sans-serif" size="2" color="#000000">Md Sahidullah</font><div><font face="comic sans ms, sans-serif" size="2" color="#000000">website: </font><font color="#0000ee" face="comic sans ms, sans-serif" size="2"><u><a href="https://sites.google.com/site/iitkgpsahi/" target="_blank">https://sites.google.com/site/iitkgpsahi/</a></u></font></div></div></div></div></div></div></div></div></div></div></div></div></div>