Author of the publication

Unraveling Adversarial Examples against Speaker Identification - Techniques for Attack Detection and Victim Model Classification.

, , , and . Odyssey, page 165-171. ISCA, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)JHU Diarization System Description., , , , and . IberSPEECH, page 236-239. ISCA, (2018)Measuring Uncertainty in Deep Regression Models: The Case of Age Estimation from Speech., , , and . ICASSP, page 4939-4943. IEEE, (2018)Spine2Net: SpineNet with Res2Net and Time-Squeeze-and-Excitation Blocks for Speaker Recognition., , , , and . Interspeech, page 496-500. ISCA, (2021)Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples., , , and . INTERSPEECH, page 4238-4242. ISCA, (2020)Segmental SpeechCLIP: Utilizing Pretrained Image-text Models for Audio-Visual Learning., , , , and . INTERSPEECH, page 431-435. ISCA, (2023)Hierarchical Transformers for Long Document Classification., , , , and . ASRU, page 838-844. IEEE, (2019)Towards Speech Processing Robust to Adversarial Deceptions.. Odyssey, ISCA, (2024)Discovering Invariant Patterns of Cognitive Decline Via an Automated Analysis of the Cookie Thief Picture Description Task., , , , , and . Odyssey, page 201-208. ISCA, (2024)Frustratingly Easy Noise-aware Training of Acoustic Models., , , and . CoRR, (2020)