Author of the publication

Representation Learning to Classify and Detect Adversarial Attacks Against Speaker and Speech Recognition Systems.

, , , and . Interspeech, page 4304-4308. ISCA, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Attentive Filtering Networks for Audio Replay Attack Detection., , , , , and . CoRR, (2018)rVAD: An unsupervised segment-based robust voice activity detection method., , and . Comput. Speech Lang., (2020)Model-Based Fairness Metric for Speaker Verification., , , , and . ASRU, page 1-7. IEEE, (2023)Beyond Isolated Utterances: Conversational Emotion Recognition., , , , and . ASRU, page 39-46. IEEE, (2021)Align or attend? Toward More Efficient and Accurate Spoken Word Discovery Using Speech-to-Image Retrieval., , , , and . ICASSP, page 7603-7607. IEEE, (2021)Focus on the Present: A Regularization Method for the ASR Source-Target Attention Layer., , , and . ICASSP, page 5994-5998. IEEE, (2021)Advances in Speaker Recognition for Telephone and Audio-Visual Data: the JHU-MIT Submission for NIST SRE19., , , , , , , , , and 1 other author(s). Odyssey, page 273-280. ISCA, (2020)The role of speaker factors in the NIST extended data task., , , , and . Odyssey, page 11. ISCA, (2008)Cosine Similarity Scoring without Score Normalization Techniques., , , , and . Odyssey, page 15. ISCA, (2010)The MIT Lincoln Laboratory / JHU / EPITA-LSE LRE17 System., , , , , , , , , and . Odyssey, page 54-59. ISCA, (2018)