Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals., , , , , , , , , and 1 other author(s). IEEE ACM Trans. Audio Speech Lang. Process., (2020)Generalized Variability Model for Speaker Verification., , , and . IEEE Signal Process. Lett., 25 (12): 1775-1779 (2018)Quasi-Factorial Prior for i-vector Extraction., , , and . IEEE Signal Process. Lett., 22 (12): 2484-2488 (2015)Improving convergence of the NLMS algorithm using constrained subband updates., and . IEEE Signal Process. Lett., 11 (9): 736-739 (2004)Golden Gemini is All You Need: Finding the Sweet Spots for Speaker Verification., , , and . CoRR, (2023)PLDA in the I-Supervector Space for Text-Independent Speaker Verification., , and . EURASIP J. Audio Speech Music. Process., (2014)Spoken Language Recognition: From Fundamentals to Practice., , and . Proc. IEEE, 101 (5): 1136-1159 (2013)Exploration of Local Variability in Text-Independent Speaker Verification., , , , , and . J. Signal Process. Syst., 82 (2): 217-228 (2016)ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech., , , , , , , , , and 9 other author(s). Comput. Speech Lang., (2020)Generalized Domain Adaptation Framework for Parametric Back-End in Speaker Recognition., , , and . IEEE Trans. Inf. Forensics Secur., (2023)