Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Malicious Email Detection using Cialdini's Principles., , , , , , , , and . AsiaJCIS, page 137-142. IEEE, (2020)Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence., , , , , , , , , and 27 other author(s). AI Mag., 40 (3): 67-78 (2019)Tuning intonation with pitch accent decomposition for HMM-based expressive speech synthesis., , and . APSIPA, page 1-10. IEEE, (2014)A comparison of dynamic WFST decoding approaches., , and . ICASSP, page 4209-4212. IEEE, (2012)Speaker Adaptive Training using Deep Neural Networks., , , , and . ICASSP, page 6349-6353. IEEE, (2014)Dialogue strategy optimization to assist user's decision for spoken consulting dialogue systems., , , , , , and . SLT, page 354-359. IEEE, (2010)Efficient multi-lingual unsupervised acoustic model training under mismatch conditions., , , and . SLT, page 24-29. IEEE, (2014)Overview of the sixth dialog system technology challenge: DSTC6., , , , , , , , , and . Comput. Speech Lang., (2019)Combination of multiple acoustic models with unsupervised adaptation for lecture speech transcription., , , , , , and . Speech Commun., (2016)Dialogue act annotation for consulting dialogue corpus., , , , and . IUCS, volume 398 of ACM International Conference Proceeding Series, page 372-378. ACM, (2009)