Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Frustratingly Easy Noise-aware Training of Acoustic Models., , , and . CoRR, (2020)Adversarial Attacks and Defenses for Speaker Identification Systems., , , , and . CoRR, (2021)Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser., , , , , , and . CoRR, (2022)State-of-the-art speaker recognition with neural network embeddings in NIST SRE18 and Speakers in the Wild evaluations., , , , , , , , , and 2 other author(s). Comput. Speech Lang., (2020)Preventing replay attacks on speaker verification systems., and . ICCST, page 1-8. IEEE, (2011)Clustering Unsupervised Representations as Defense Against Poisoning Attacks on Speech Commands Classification System., , , , , , and . ASRU, page 1-8. IEEE, (2023)ASSERT: Anti-Spoofing with Squeeze-Excitation and Residual Networks., , , and . INTERSPEECH, page 1013-1017. ISCA, (2019)Defense against Adversarial Attacks on Hybrid Speech Recognition System using Adversarial Fine-tuning with Denoiser., , , , , , and . INTERSPEECH, page 5035-5039. ISCA, (2022)Chunking Defense for Adversarial Attacks on ASR., , , , , and . INTERSPEECH, page 5045-5049. ISCA, (2022)Joint domain adaptation and speech bandwidth extension using time-domain GANs for speaker verification., , , and . INTERSPEECH, page 615-619. ISCA, (2022)