Author of the publication

Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints.

, , , , , and . INTERSPEECH, page 950-954. ISCA, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cosine Scoring with Uncertainty for Neural Speaker Embedding., and . CoRR, (2024)Maximal Figure-of-Merit Embedding for Multi-Label Audio Classification., , and . ICASSP, page 136-140. IEEE, (2018)Adaptive filtering using constrained subband updates., and . ISCAS (3), page 2275-2278. IEEE, (2005)An extensible speaker identification sidekit in Python., , and . ICASSP, page 5095-5099. IEEE, (2016)A hybrid modeling strategy for GMM-SVM speaker recognition with adaptive relevance factor., , and . INTERSPEECH, page 2746-2749. ISCA, (2010)Gain Compensation for Fast i-Vector Extraction Over Short Duration., and . INTERSPEECH, page 1527-1531. ISCA, (2017)Visualizing Classifier Adjacency Relations: A Case Study in Speaker Verification and Voice Anti-Spoofing., , , , , , , , and . Interspeech, page 4299-4303. ISCA, (2021)Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints., , , , , and . INTERSPEECH, page 950-954. ISCA, (2013)Multi-session PLDA scoring of i-vector for partially open-set speaker detection., , , , and . INTERSPEECH, page 3651-3655. ISCA, (2013)The IIR Submission to CSLP 2006 Speaker Recognition Evaluation., , , , , , , , , and 2 other author(s). ISCSLP (Selected Papers), volume 4274 of Lecture Notes in Computer Science, page 494-505. Springer, (2006)