Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who Do I Sound Like? Showcasing Speaker Recognition Technology by YouTube Voice Search., , , , and . CoRR, (2018)ASVtorch toolkit: Speaker verification with deep neural networks., , and . SoftwareX, (2021)I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences., , , , , , , , , and 36 other author(s). CoRR, (2019)Voice biometrics security: Extrapolating false alarm rate via hierarchical Bayesian modeling of speaker verification scores., , , and . Comput. Speech Lang., (2020)UIAI System for Short-Duration Speaker Verification Challenge 2020., , , , , , , and . CoRR, (2020)Voice Mimicry Attacks Assisted by Automatic Speaker Verification., , , and . Comput. Speech Lang., (2020)Speaker recognition from whispered speech: A tutorial survey and an application of time-varying linear prediction., , , , and . Speech Commun., (2018)Voice Mimicry Attacks Assisted by Automatic Speaker Verification., , , and . CoRR, (2019)Who Do I Sound like? Showcasing Speaker Recognition Technology by Youtube Voice Search., , , , and . ICASSP, page 5781-5785. IEEE, (2019)Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection., , , and . ICASSP, page 6146-6150. IEEE, (2019)