Author of the publication

Introducing i-vectors for joint anti-spoofing and speaker verification.

, , , , and . INTERSPEECH, page 61-65. ISCA, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Audio Splicing Localization: Can We Accurately Locate the Splicing Tampering?, and . ISCSLP, page 120-124. IEEE, (2022)Voice conversion and spoofing attack on speaker verification systems., and . APSIPA, page 1-9. IEEE, (2013)Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech., , , , , and . ICASSP, page 4401-4404. IEEE, (2012)Improved prosody generation by maximizing joint likelihood of state and longer units., , and . ICASSP, page 3781-3784. IEEE, (2009)SAS: A speaker verification spoofing database containing diverse attacks., , , , , , and . ICASSP, page 4440-4444. IEEE, (2015)Spoofing detection from a feature representation perspective., , , , and . ICASSP, page 2119-2123. IEEE, (2016)Robust TTS duration modelling using DNNS., , , , , and . ICASSP, page 5130-5134. IEEE, (2016)Efficient architecture for soft-output massive MIMO detection with Gauss-Seidel method., , , , and . ISCAS, page 1886-1889. IEEE, (2016)Exemplar-based unit selection for voice conversion utilizing temporal information., , , , and . INTERSPEECH, page 3057-3061. ISCA, (2013)Automatic speaker verification spoofing and countermeasures (ASVspoof 2015): introductory talk by the organizers., and . INTERSPEECH, ISCA, (2015)