Inproceedings,

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech.

, , , , , and .
ICASSP, page 4401-4404. IEEE, (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews