Author of the publication

Perceptual Evaluation of the Effectiveness of Voice Disguise by Age Modification.

, , , and . Odyssey, page 320-326. ISCA, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Articulation During Voice Disguise: A Pilot Study., , , , and . SPECOM, volume 12997 of Lecture Notes in Computer Science, page 680-691. Springer, (2021)Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection., , , and . ICASSP, page 6146-6150. IEEE, (2019)I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry., , , , and . INTERSPEECH, page 930-934. ISCA, (2013)Data Quality as Predictor of Voice Anti-Spoofing Generalization., , , and . Interspeech, page 1659-1663. ISCA, (2021)Merging human and automatic system decisions to improve speaker recognition performance., , , and . INTERSPEECH, page 2519-2523. ISCA, (2013)Gamified Speaker Comparison by Listening., , and . Odyssey, page 421-427. ISCA, (2022)RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research., , , , , , , , , and 3 other author(s). ICASSP, page 5395-5399. IEEE, (2017)Automatic voice activity detection in different speech applications., , and . e-Forensics, page 12. ICST/ACM, (2008)Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection., , , and . CoRR, (2018)Age-Related Voice Disguise and its Impact on Speaker Verification Accuracy., , , and . Odyssey, page 277-282. ISCA, (2016)