98%
921
2 minutes
20
Voice-based authentication systems have become increasingly vulnerable to logical access (LA) spoofing through sophisticated voice conversion (VC) and text-to-speech (TTS) attacks. This paper proposes an end-to-end deep learning approach DeepLASD, that processes raw waveforms to detect spoofed speech without relying on handcrafted features. The model incorporates a SincConv layer for interpretable spectral processing, along with residual convolutional blocks that integrate attention for improved feature extraction. We introduce GeLU activation in residual blocks to enhance our method's ability to better capture the unique traits in real and spoof samples. A gated recurrent unit is further employed for temporal dynamics modeling. Extensive experimentation was conducted on the large-scale and diverse ASVspoof 2019 and 2021 datasets. Achieving an Equal Error Rate as low as [Formula: see text] and a minimum Tandem Detection Cost Function of 0.1208, along with strong generalization to both VC and TTS spoof types, demonstrate the competency of the proposed method for LA spoofing detection. Although the results on the ASVspoof 2021 dataset underscore the challenges posed by next-generation synthetic speech, the proposed solution exhibits notable adaptability. These findings affirm that the proposed end-to-end anti-spoofing framework enhances security and detection capabilities in voice authentication systems.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12219221 | PMC |
http://dx.doi.org/10.1038/s41598-025-04808-5 | DOI Listing |
J Glaucoma
September 2025
Department of Ophthalmology, Kurashiki Medical Center, Kurashiki, Okayama, Japan.
Prcis: Protocol 30-2 of Melbourne Rapid Fields, online computer perimetry, provides a portable, reliable, and patient-friendly alternative to Humphrey Field Analyzer 30-2 SITA fast protocol for Japanese all severity stages of glaucoma patients.
Purpose: Melbourne Rapid Fields (MRF) online computer perimetry is a web-browser-based software that offers white-on-white threshold perimetry using any computer. This study evaluates the perimetric results of 30-2 protocol from MRF performed using a laptop computer in comparison to Humphrey Field Analyzer (HFA).
Disabil Rehabil Assist Technol
September 2025
International Communication College, Jilin International Studies University, Changchun, Jilin, China.
Background: Conventional automated writing evaluation systems typically provide insufficient support for students with special needs, especially in tonal language acquisition such as Chinese, primarily because of rigid feedback mechanisms and limited customisation.
Objective: This research develops context-aware Hierarchical AI Tutor for Writing Enhancement(CHATWELL), an intelligent tutoring platform that incorporates optimised large language models to deliver instantaneous, customised, and multi-dimensional writing assistance for Chinese language learners, with special consideration for those with cognitive learning barriers.
Methods: CHATWELL employs a hierarchical AI framework with a four-tier feedback mechanism designed to accommodate diverse learning needs.
Nurs Open
September 2025
Faculty of Nursing, Universitas Pelita Harapan, Jakarta, Indonesia.
Background: Being a global profession, having evolved differently across different geographical areas, and with increasing global migration, nursing is well positioned to undertake comparative research to facilitate understanding and identify areas for development. Despite this, little is known about comparative research use in nursing, and there is little guidance for researchers on how to approach it. With increasingly sophisticated approaches, there is a need to understand how comparative analysis is currently being used.
View Article and Find Full Text PDFDisabil Rehabil Assist Technol
September 2025
Department of Education, Fuzhou University of International Studies and Trade, Fuzhou, China.
This study explores the integration of traditional Chinese "Fu" culture into the moral education system for students with disabilities across K-12 and higher education through artificial intelligence. By leveraging soft computing to handle cultural ambiguities, it constructs an adaptive educational framework that aligns students' cognitive characteristics with curriculum demands, thereby enhancing their identification with Chinese culture. Guided by the theory of the "Second Combination," the research employs AI-powered soft computing to analyze the semantic and cognitive dimensions of "Fu" culture.
View Article and Find Full Text PDFFront Artif Intell
August 2025
Aviation Industry Development Research Center of China, Beijing, China.
Autonomous systems operating in high-dimensional environments increasingly rely on prioritization heuristics to allocate attention and assess risk, yet these mechanisms can introduce cognitive biases such as salience, spatial framing, and temporal familiarity that influence decision-making without altering the input or accessing internal states. This study presents Priority Inversion via Operational Reasoning (PRIOR), a black-box, non-perturbative diagnostic framework that employs structurally biased but semantically neutral scenario cues to probe inference-level vulnerabilities without modifying pixel-level, statistical, or surface semantic properties. Given the limited accessibility of embodied vision-based systems, we evaluate PRIOR using large language models (LLMs) as abstract reasoning proxies to simulate cognitive prioritization in constrained textual surveillance scenarios inspired by Unmanned Aerial Vehicle (UAV) operations.
View Article and Find Full Text PDF