Author of the publication

Cross-Domain Replay Spoofing Attack Detection Using Domain Adversarial Training.

, , , , and . INTERSPEECH, page 2938-2942. ISCA, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Networking Support for Bidirectional Cross-Technology Communication., , , , , , and . IEEE Trans. Mob. Comput., 20 (1): 204-216 (2021)Phase Limitations of Zames-Falb Multipliers., , and . IEEE Trans. Automat. Contr., 63 (4): 947-959 (2018)On the Characterization of Data Cache Vulnerability in High-Performance Embedded Microprocessors., , and . ICSAMOS, page 14-20. IEEE, (2006)Optimization of UMHexagonS algorithm for AVS+., and . BMSB, page 1-5. IEEE, (2015)Decision fusion for EEG-based emotion recognition., , and . ICMLC, page 883-889. IEEE, (2015)Possible Quantum Paraelectric State in Kitaev Spin Liquid Candidate H$_3$LiIr$_2$O$_6$, , and . (2018)cite arxiv:1807.03092Comment: 5 pages, 5 figures.Parallel Crime Scene Analysis Based on ACP Approach., , , , , and . IEEE Trans. Comput. Social Systems, 5 (1): 244-255 (2018)Some facts you may want to know about water-filling solutions., , , , and . ICCC, page 1-6. IEEE, (2017)Design of Non-Adaptive Querying Policies Based on Error Control Coding., , , and . IEEE Access, (2020)The classification prognosis models of hepatitis b virus reactivation based on Bayes and support vector machine after feature extraction of genetic algorithm., , , , , and . ICNC-FSKD, page 572-577. IEEE, (2016)