Abstract: Partially deepfake audio attacks have attracted the attention recently, and the demand for locating the manipulation regions of partially deepfake audio arises accordingly. However, existing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results