The paper https://arxiv.org/abs/1904.05441 has a list of spoofing methods.
Here's one method as paper https://arxiv.org/pdf/1806.04558.pdf
And here on GitHub https://github.com/CorentinJ/Real-Time-Voice-Cloning
The paper https://arxiv.org/abs/1904.05441 has a list of spoofing methods.
Here's one method as paper https://arxiv.org/pdf/1806.04558.pdf
And here on GitHub https://github.com/CorentinJ/Real-Time-Voice-Cloning