Author of the publication

Extended Constant-Q Cepstral Coefficients for Detection of Spoofing Attacks.

, , and . APSIPA, page 1024-1029. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spoofing and countermeasures for speaker verification: A survey., , , , , and . Speech Commun., (2015)Text-dependent speaker verification: Classifiers, databases and RSR2015., , , and . Speech Commun., (2014)An adaptive transmission line cochlear model based front-end for replay attack detection., , , , and . Speech Commun., (2021)I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences., , , , , , , , , and 36 other author(s). CoRR, (2019)Wikipedia-based Kernels for dialogue topic tracking., , and . ICASSP, page 131-135. IEEE, (2014)A life-size robotic lion dance system with integrated motion control., , , , , , , and . RO-MAN, page 687-692. IEEE, (2009)Combining multiple kernel models for automatic intelligibility detection of pathological speech., , and . ICASSP, page 6485-6489. IEEE, (2016)Ensemble Nyström method for predicting conflict level from speech., , and . APSIPA, page 1-5. IEEE, (2014)Language identification through large vocabulary continuous speech recognition., , and . ISCSLP, page 49-52. IEEE, (2004)UBM data selection for effective speaker modeling., and . ISCSLP, page 162-165. IEEE, (2010)