From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Audio Splicing Localization: Can We Accurately Locate the Splicing Tampering?, и . ISCSLP, стр. 120-124. IEEE, (2022)Efficient architecture for soft-output massive MIMO detection with Gauss-Seidel method., , , , и . ISCAS, стр. 1886-1889. IEEE, (2016)Voice conversion and spoofing attack on speaker verification systems., и . APSIPA, стр. 1-9. IEEE, (2013)SAS: A speaker verification spoofing database containing diverse attacks., , , , , , и . ICASSP, стр. 4440-4444. IEEE, (2015)Spoofing detection from a feature representation perspective., , , , и . ICASSP, стр. 2119-2123. IEEE, (2016)Robust TTS duration modelling using DNNS., , , , , и . ICASSP, стр. 5130-5134. IEEE, (2016)Improved prosody generation by maximizing joint likelihood of state and longer units., , и . ICASSP, стр. 3781-3784. IEEE, (2009)Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech., , , , , и . ICASSP, стр. 4401-4404. IEEE, (2012)Cross-Lingual Voice Conversion with a Cycle Consistency Loss on Linguistic Representation., , , и . Interspeech, стр. 1374-1378. ISCA, (2021)Automatic speaker verification spoofing and countermeasures (ASVspoof 2015): introductory talk by the organizers., и . INTERSPEECH, ISCA, (2015)