Author of the publication

Introducing i-vectors for joint anti-spoofing and speaker verification.

, , , , and . INTERSPEECH, page 61-65. ISCA, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multispectral Deep Embeddings as a Countermeasure to Custom Silicone Mask Presentation Attacks., , and . IEEE Trans. Biom. Behav. Identity Sci., 1 (4): 238-251 (2019)Biometric Antispoofing Methods: A Survey in Face Recognition., , and . IEEE Access, (2014)Domain Adaptation for Generalization of Face Presentation Attack Detection in Mobile Settengs with Minimal Information., , and . ICASSP, page 1001-1005. IEEE, (2020)Improving Cross-Dataset Performance of Face Presentation Attack Detection Systems Using Face Recognition Datasets., , and . ICASSP, page 2947-2951. IEEE, (2020)Keystroke Biometrics Ongoing Competition., , , , , , , and . IEEE Access, (2016)Impact of Score Fusion on Voice Biometrics and Presentation Attack Detection in Cross-Database Evaluations., and . IEEE J. Sel. Top. Signal Process., 11 (4): 695-705 (2017)Benchmarking of Cancelable Biometrics for Deep Templates., , , , , , , and . CoRR, (2023)Subjective and Objective Evaluation of Deepfake Videos., and . ICASSP, page 2510-2514. IEEE, (2021)Deep Auto-Encoding and Biohashing for Secure Finger Vein Recognition., and . ICASSP, page 2585-2589. IEEE, (2021)Spoofing 2D Face Recognition Systems with 3D Masks., and . BIOSIG, volume P-212 of LNI, page 209-216. GI, (2013)