Fig. 3From: Vulnerability issues in Automatic Speaker Verification (ASV) systemsTarget selection: by using the attacker’s ASV to attack the victim’s ASV. After [16]Back to article page