Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On GDPR Compliance of Companies' Privacy Policies., , , , and . TSD, volume 11697 of Lecture Notes in Computer Science, page 151-159. Springer, (2019)Speech is Silver, Silence is Golden: What do ASVspoof-trained Models Really Learn?, , , , and . CoRR, (2021)Adversarial Vulnerability of Active Transfer Learning., and . IDA, volume 12695 of Lecture Notes in Computer Science, page 116-127. Springer, (2021)MLAAD: The Multi-Language Audio Anti-Spoofing Dataset., , , , , , , , and . IJCNN, page 1-7. IEEE, (2024)Attacker Attribution of Audio Deepfakes., , and . INTERSPEECH, page 2788-2792. ISCA, (2022)Shortcut Detection With Variational Autoencoders., , , , and . IJCNN, page 1-7. IEEE, (2024)Distributed Anomaly Detection of Single Mote Attacks in RPL Networks., , , and . ICETE (2), page 378-385. SciTePress, (2019)Data Poisoning Attacks on Regression Learning and Corresponding Defenses., , and . PRDC, page 80-89. IEEE, (2020)Localized Shortcut Removal., , , and . CVPR Workshops, page 3721-3725. IEEE, (2023)Easy, Interpretable, Effective: openSMILE for voice deepfake detection., , , and . CoRR, (2024)