Персона: Ефанов, Дмитрий Валерьевич
Загружается...
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Ефанов
Имя
Дмитрий Валерьевич
Имя
3 results
Результаты поиска
Теперь показываю 1 - 3 из 3
- ПубликацияТолько метаданныеThe BiLSTM-based synthesized speech recognition(2022) Efanov, D.; Aleksandrov, P.; Karapetyants, N.; Ефанов, Дмитрий Валерьевич; Александров, Павел Сергеевич; Карапетьянц, НиколайHomer Dudley s VODER is considered the first attempt to synthesize human speech electronically by breaking it down into acoustic components. Fifty years later, Terminator 2 featured an example of human speech synthesized with artificial intelligence that was used to deceive a human. Speech synthesis is the artificial simulation of human speech using a computer or other device. The counterpart of the voice recognition, speech synthesis is mainly used to convert textual information into audio information so that a person can naturally interact with digital devices. For example, it is used in assistive technology to help visually impaired people read textual content. A separate direction is the use of speech synthesis to create a clone of a person s voice. Deepfake voice technology, also called voice cloning, has advanced to the point where it can accurately reproduce the human voice by mimicking intonation and other features of the speaker. And it can be used to harm a person. Attackers can employ it to fool voice authentication systems or create fake audio recordings to defame public figures, or combine voice clone with social engineering techniques to bamboozle people. This article discusses the architecture of a voice recognition system that will significantly reduce the possibility of fraud using deepfake voice.
- ПубликацияТолько метаданныеCloud-based electronic signature authentication issues(2019) Andrianova, V.; Efanov, D.; Ефанов, Дмитрий Валерьевич© 2019 IEEE One of the main directions in today's sphere of information technologies is user convenience. In this regard, and not far behind the area of information security measures are taken to reduce the size of the equipment, to reduce the size of the memory application, increasing the speed of the application, while not lowering the level of security and without reducing the functionality of applications. In this paper, we consider a way to improve the user experience when working with the public key infrastructure by transferring some functions to a secure remote server.
- ПубликацияТолько метаданныеComparison of the effectiveness of cepstral coefficients for Russian speech synthesis detection(2024) Efanov, D.; Aleksandrov, P.; Mironov, I.; Ефанов, Дмитрий Валерьевич; Александров, Павел Сергеевич