Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The PartialSpoof Database and Countermeasures for the Detection of Short Fake Speech Segments Embedded in an Utterance., , , , and . IEEE ACM Trans. Audio Speech Lang. Process., (2023)Introduction to Voice Presentation Attack Detection and Recent Advances., , , , , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)Can Spoofing Countermeasure And Speaker Verification Systems Be Jointly Optimised?, , , and . ICASSP, page 1-5. IEEE, (2023)Phone adaptive training for short-duration speaker verification., , , and . EUSIPCO, page 2107-2111. IEEE, (2015)Acoustic context recognition for mobile devices using a reduced complexity SVM., , , , and . EUSIPCO, page 534-538. IEEE, (2015)End-to-End Spectro-Temporal Graph Attention Networks for Speaker Verification Anti-Spoofing and Speech Deepfake Detection., , , , , and . CoRR, (2021)Recent Trends in Video Analysis: A Taxonomy of Video Classification Problems., , , , and . IMSA, page 348-353. IASTED/ACTA Press, (2002)Evasion and obfuscation in automatic speaker verification., , and . ICASSP, page 749-753. IEEE, (2014)Efficient Super-Wide Bandwidth Extension Using Linear Prediction Based Analysis-Synthesis., , and . ICASSP, page 5429-5433. IEEE, (2018)Spoofing countermeasures to protect automatic speaker verification from voice conversion., , and . ICASSP, page 3068-3072. IEEE, (2013)