Author of the publication

Introduction to the Issue on Spoofing and Countermeasures for Automatic Speaker Verification.

, , , , and . IEEE J. Sel. Top. Signal Process., 11 (4): 585-587 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

End-to-End Spectro-Temporal Graph Attention Networks for Speaker Verification Anti-Spoofing and Speech Deepfake Detection., , , , , and . CoRR, (2021)The PartialSpoof Database and Countermeasures for the Detection of Short Fake Speech Segments Embedded in an Utterance., , , , and . IEEE ACM Trans. Audio Speech Lang. Process., (2023)Introduction to Voice Presentation Attack Detection and Recent Advances., , , , , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)Recent Trends in Video Analysis: A Taxonomy of Video Classification Problems., , , , and . IMSA, page 348-353. IASTED/ACTA Press, (2002)Artificial Bandwidth Extension Using Conditional Variational Auto-encoders and Adversarial Learning., , and . ICASSP, page 6924-6928. IEEE, (2020)Can Spoofing Countermeasure And Speaker Verification Systems Be Jointly Optimised?, , , and . ICASSP, page 1-5. IEEE, (2023)Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion., , , , , , , , , and 5 other author(s). Odyssey, page 330-337. ISCA, (2022)Phone adaptive training for short-duration speaker verification., , , and . EUSIPCO, page 2107-2111. IEEE, (2015)Acoustic context recognition for mobile devices using a reduced complexity SVM., , , , and . EUSIPCO, page 534-538. IEEE, (2015)Spoofing countermeasures to protect automatic speaker verification from voice conversion., , and . ICASSP, page 3068-3072. IEEE, (2013)