Author of the publication

An Investigation of Non-linear i-vectors for Speaker Verification.

, , and . INTERSPEECH, page 87-91. ISCA, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frustratingly Easy Noise-aware Training of Acoustic Models., , , and . CoRR, (2020)Adversarial Attacks and Defenses for Speaker Identification Systems., , , , and . CoRR, (2021)ASSERT: Anti-Spoofing with Squeeze-Excitation and Residual Networks., , , and . INTERSPEECH, page 1013-1017. ISCA, (2019)Tied Variational Autoencoder Backends for i-Vector Speaker Recognition., , and . INTERSPEECH, page 1004-1008. ISCA, (2017)Joint domain adaptation and speech bandwidth extension using time-domain GANs for speaker verification., , , and . INTERSPEECH, page 615-619. ISCA, (2022)Defense against Adversarial Attacks on Hybrid Speech Recognition System using Adversarial Fine-tuning with Denoiser., , , , , , and . INTERSPEECH, page 5035-5039. ISCA, (2022)Invariant Representation Learning for Robust Far-Field Speaker Recognition., , , , and . SLSP, volume 13062 of Lecture Notes in Computer Science, page 97-110. Springer, (2021)Clustering Unsupervised Representations as Defense Against Poisoning Attacks on Speech Commands Classification System., , , , , , and . ASRU, page 1-8. IEEE, (2023)Preventing replay attacks on speaker verification systems., and . ICCST, page 1-8. IEEE, (2011)Chunking Defense for Adversarial Attacks on ASR., , , , , and . INTERSPEECH, page 5045-5049. ISCA, (2022)