Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eigenvoice speaker adaptation with minimal data for statistical speech synthesis systems using a MAP approach and nearest-neighbors., , and . IEEE ACM Trans. Audio Speech Lang. Process., 22 (12): 2146-2157 (2014)On Effectiveness of Anomaly Detection Approaches against Unseen Presentation Attacks in Face Anti-spoofing., , , and . ICB, page 75-81. IEEE, (2018)Construction project risk assessment using combined fuzzy and FMEA., and . IFSA/NAFIPS, page 232-237. IEEE, (2013)Using Neural Network for Solving of On-Line Economic Dispatch Problem., and . CIMCA/IAWTIC, page 87. IEEE Computer Society, (2006)Spoofing Deep Face Recognition with Custom Silicone Masks., , and . BTAS, page 1-7. IEEE, (2018)Nearest neighbor approach in speaker adaptation for HMM-based speech synthesis., and . SIU, page 1-4. IEEE, (2013)A competition on generalized software-based face presentation attack detection in mobile scenarios., , , , , , , , , and 35 other author(s). IJCB, page 688-696. IEEE, (2017)Spoofing voice verification systems with statistical speech synthesis using limited adaptation data., , and . Comput. Speech Lang., (2017)Evaluation Methodologies for Biometric Presentation Attack Detection., , , and . Handbook of Biometric Anti-Spoofing, 2nd Ed., Springer, (2019)A Sawtooth Permanent Magnetic Lattice for Ultracold Atoms and BECs, and . (Jan 28, 2011)