Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Morphological filtering of speech spectrograms in the context of additive noise., , , and . INTERSPEECH, ISCA, (2003)Towards a New Image-Based Spectrogram Segmentation Speech Coder Optimised for Intelligibility., , , and . MMM, volume 5371 of Lecture Notes in Computer Science, page 63-73. Springer, (2009)Introduction to the Issue on Spoofing and Countermeasures for Automatic Speaker Verification., , , , and . IEEE J. Sel. Top. Signal Process., 11 (4): 585-587 (2017)An experimental framework for the derivation of perceptually-optimal noise suppression functions., , , , and . ICASSP, page 7800-7804. IEEE, (2013)Evasion and obfuscation in speaker recognition surveillance and forensics., , , , and . IWBF, page 1-6. IEEE, (2014)The lia-eurecom RT'09 speaker diarization system: Enhancements in speaker modelling and cluster purification., , and . ICASSP, page 4958-4961. IEEE, (2010)A comparison of different loudspeaker models to empirically estimated non-linearities., , , , and . HSCMA, page 112-116. IEEE, (2014)Computationally efficient noise compensation for robust automatic speech recognition assessed under the Aurora 2/3 framework., and . INTERSPEECH, page 485-488. ISCA, (2002)Texture-based Presentation Attack Detection for Automatic Speaker Verification., , , , , and . WIFS, page 1-6. IEEE, (2020)Rawboost: A Raw Data Boosting and Augmentation Method Applied to Automatic Speaker Verification Anti-Spoofing., , , , and . ICASSP, page 6382-6386. IEEE, (2022)