Author of the publication

Anti-spoofing Methods for Automatic Speaker Verification System.

, , and . AIST, volume 661 of Communications in Computer and Information Science, page 172-184. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)STC Speaker Recognition System for the NIST i-Vector Challenge., , and . Odyssey, ISCA, (2014)Anti-spoofing Methods for Automatic Speaker Verification System., , and . AIST, volume 661 of Communications in Computer and Information Science, page 172-184. (2016)Non-linear PLDA for i-vector speaker verification., , , , and . INTERSPEECH, page 214-218. ISCA, (2015)Text-dependent GMM-JFA system for password based speaker verification., , , and . ICASSP, page 729-733. IEEE, (2014)Audio-Replay Attack Detection Countermeasures., , , , , and . SPECOM, volume 10458 of Lecture Notes in Computer Science, page 171-181. Springer, (2017)Speaker Diarization with Deep Speaker Embeddings for DIHARD Challenge II., , , , , , , and . INTERSPEECH, page 1003-1007. ISCA, (2019)A Speaker Recognition System for the SITW Challenge., , , and . INTERSPEECH, page 833-837. ISCA, (2016)On deep speaker embeddings for text-independent speaker recognition., , , , and . Odyssey, page 378-385. ISCA, (2018)STC Anti-spoofing Systems for the ASVspoof 2015 Challenge., , , , and . CoRR, (2015)