Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A modular architecture based on image quality for fingerprint spoof detection., , , , , , , and . SMC, page 258-262. IEEE, (2012)2D/3D Megavoltage Image Registration Using Convolutional Neural Networks., , , , and . CoRR, (2018)A Hybrid GMM Speaker Verification System for Mobile Devices in Variable Environments., , , and . IDEAL, volume 7435 of Lecture Notes in Computer Science, page 451-458. Springer, (2012)Speaker segmentation using i-vector in meetings domain., , , , and . ICASSP, page 5455-5459. IEEE, (2017)Type-2 Fuzzy GMMs for Robust Text-Independent Speaker Verification in Noisy Environments., , , , and . ICPR, page 4531-4536. IEEE Computer Society, (2014)Type-2 fuzzy GMM for text-independent speaker verification under unseen noise conditions., , , , and . ICASSP, page 5490-5494. IEEE, (2016)Speaker verification using type-2 Fuzzy Gaussian Mixture Models., , , and . SMC, page 2336-2340. IEEE, (2012)Type-2 Fuzzy GMM-UBM for Text-Independent Speaker Verification., , , , and . SMC, page 4328-4331. IEEE, (2013)A fingerprint spoof detection based on MLP and SVM., , , , , , , and . IJCNN, page 1-7. IEEE, (2012)Optimizing speaker-specific filter banks for speaker verification., , , , , and . ICASSP, page 5350-5354. IEEE, (2017)