Author of the publication

Reverse Engineering of Deceptions on Machine- and Human-Centric Attacks.

, , , , , , , and . Found. Trends Priv. Secur., 6 (2): 53-152 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Plausibility functions in continuous speech recognition: The VINICS system., and . Speech Commun., 13 (1-2): 187-196 (1993)Assessing the importance of the segmentation probability in segment-based speech recognition., , , , and . Speech Commun., 24 (1): 51-72 (1998)Privacy Regulation Aware Process Mapping in Geo-Distributed Cloud Data Centers., , , , , and . IEEE Trans. Parallel Distributed Syst., 30 (8): 1872-1888 (2019)Streaming Multi-Talker Speech Recognition with Joint Speaker Identification., , , and . Interspeech, page 1782-1786. ISCA, (2021)Microsoft Speaker Diarization System for the VoxCeleb Speaker Recognition Challenge 2020., , , , , , , , , and 3 other author(s). CoRR, (2020)Multi Transcription-Style Speech Transcription Using Attention-Based Encoder-Decoder Model., , , , and . ASRU, page 1-6. IEEE, (2023)Diarisation using location tracking with agglomerative clustering., , , and . CoRR, (2021)Adversarial Feature-Mapping for Speech Enhancement., , , and . INTERSPEECH, page 3259-3263. ISCA, (2018)Modelling long term variability information in mixture stochastic trajectory framework., , and . ICSLP, page 334-337. ISCA, (1996)Source normalization training for HMM applied to noisy telephone speech recognition.. EUROSPEECH, page 1555-1558. ISCA, (1997)