From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , и . SPECOM, том 9319 из Lecture Notes in Computer Science, стр. 480-486. Springer, (2015)Neural Network Compression Framework for Fast Model Inference., , , , и . SAI (3), том 285 из Lecture Notes in Networks and Systems, стр. 213-232. Springer, (2021)SVID Speaker Recognition System for NIST SRE 2012., , , , , и . SPECOM, том 8113 из Lecture Notes in Computer Science, стр. 278-285. Springer, (2013)Neural Network Compression Framework for fast model inference., , , , и . CoRR, (2020)Development of Real-time ADAS Object Detector for Deployment on CPU., и . CoRR, (2018)The Diarization System for an Unknown Number of Speakers., и . SPECOM, том 8113 из Lecture Notes in Computer Science, стр. 340-344. Springer, (2013)Audio-Replay Attack Detection Countermeasures., , , , , и . SPECOM, том 10458 из Lecture Notes in Computer Science, стр. 171-181. Springer, (2017)A Speaker Recognition System for the SITW Challenge., , , и . INTERSPEECH, стр. 833-837. ISCA, (2016)Lightweight network architecture for real-time action recognition., , и . SAC, стр. 2074-2080. ACM, (2020)STC anti-spoofing systems for the ASVspoof 2015 challenge., , , , и . ICASSP, стр. 5475-5479. IEEE, (2016)