Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/icassp/KinnunenWLSCL12
%A Kinnunen, Tomi
%A Wu, Zhizheng
%A Lee, Kong-Aik
%A Sedlak, Filip
%A Chng, Engsiong
%A Li, Haizhou
%B ICASSP
%D 2012
%I IEEE
%K dblp
%P 4401-4404
%T Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech.
%U http://dblp.uni-trier.de/db/conf/icassp/icassp2012.html#KinnunenWLSCL12
%@ 978-1-4673-0046-9
@inproceedings{conf/icassp/KinnunenWLSCL12,
added-at = {2023-02-18T00:00:00.000+0100},
author = {Kinnunen, Tomi and Wu, Zhizheng and Lee, Kong-Aik and Sedlak, Filip and Chng, Engsiong and Li, Haizhou},
biburl = {https://www.bibsonomy.org/bibtex/2e0313b4e7ae6893fc0b74a74d027098e/dblp},
booktitle = {ICASSP},
crossref = {conf/icassp/2012},
ee = {https://doi.org/10.1109/ICASSP.2012.6288895},
interhash = {f21dd0f87f6a7229bfeb89495ad9585f},
intrahash = {e0313b4e7ae6893fc0b74a74d027098e},
isbn = {978-1-4673-0046-9},
keywords = {dblp},
pages = {4401-4404},
publisher = {IEEE},
timestamp = {2024-04-10T07:48:17.000+0200},
title = {Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech.},
url = {http://dblp.uni-trier.de/db/conf/icassp/icassp2012.html#KinnunenWLSCL12},
year = 2012
}