Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inductive and transductive link prediction for criminal network analysis., , , , , , , , and . J. Comput. Sci., (September 2023)Speaker Recognition on Mono-Channel Telephony Recordings., , , , and . Odyssey, page 193-199. ISCA, (2022)Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures., , , , , and . IEEE Access, (2019)MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication., , and . DSC, page 1-8. IEEE, (2018)Null-Hypothesis LLR: A Proposal for Forensic Automatic Speaker Recognition., , and . INTERSPEECH, page 2849-2853. ISCA, (2017)SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit., , , and . WOOT, USENIX Association, (2017)Considering speech quality in speaker verification fusion., and . INTERSPEECH, page 2189-2192. ISCA, (2005)DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise., , , and . CoRR, (2016)Selective Fusion for Speaker Verification in Surveillance., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 269-279. Springer, (2005)Virtual fusion for speaker recognition., and . INTERSPEECH, page 1997-2000. ISCA, (2007)