Author of the publication

A Probabilistic Fusion Framework for Spoofing Aware Speaker Verification.

, , and . Odyssey, page 77-84. ISCA, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The joint distribution of Parisian and hitting times of Brownian motion with application to Parisian option pricing., and . Finance and Stochastics, 20 (3): 773-804 (2016)Ultra-low Power Access Strategy for Process-Voltage-Temperature Aware STT-MRAM., , and . ASICON, page 1-4. IEEE, (2021)YNU-HPCC at SemEval-2023 Task 6: LEGAL-BERT Based Hierarchical BiLSTM with CRF for Rhetorical Roles Prediction., , , and . SemEval@ACL, page 2075-2081. Association for Computational Linguistics, (2023)MA-BERT: Learning Representation by Incorporating Multi-Attribute Knowledge in Transformers., , , and . ACL/IJCNLP (Findings), volume ACL/IJCNLP 2021 of Findings of ACL, page 2338-2343. Association for Computational Linguistics, (2021)DyViSE: Dynamic Vision-Guided Speaker Embedding for Audio-Visual Speaker Diarization., , , , and . MMSP, page 1-6. IEEE, (2022)Speaker Independent Audio-Visual Speech Recognition., , and . IEEE International Conference on Multimedia and Expo (II), page 1073-1076. IEEE Computer Society, (2000)Research on Full Process Extraction Method for long texts in power grid operation tickets based on LTP Algorithm., , , and . CMLDS, page 56:1-56:7. ACM, (2024)Personalized LoRA for Human-Centered Text Understanding., , , , and . CoRR, (2024)Detecting bad information in mobile wireless networks based on the wireless application protocol., , and . Computing, 96 (9): 855-874 (2014)Data Augmentation for Deep Learning-Based Radio Modulation Classification., , , , , and . IEEE Access, (2020)