Author of the publication

Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples.

, , , and . INTERSPEECH, page 4238-4242. ISCA, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Single Channel Far Field Feature Enhancement For Speaker Verification In The Wild., , , , and . CoRR, (2020)Perceptual Loss based Speech Denoising with an ensemble of Audio Pattern Recognition and Self-Supervised Models., , and . CoRR, (2020)Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Spine2Net: SpineNet with Res2Net and Time-Squeeze-and-Excitation Blocks for Speaker Recognition., , , , and . Interspeech, page 496-500. ISCA, (2021)Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples., , , and . INTERSPEECH, page 4238-4242. ISCA, (2020)Unsupervised Speech Segmentation and Variable Rate Representation Learning Using Segmental Contrastive Predictive Coding., , , , and . IEEE ACM Trans. Audio Speech Lang. Process., (2022)Measuring Uncertainty in Deep Regression Models: The Case of Age Estimation from Speech., , , and . ICASSP, page 4939-4943. IEEE, (2018)Hierarchical Transformers for Long Document Classification., , , , and . ASRU, page 838-844. IEEE, (2019)JHU Diarization System Description., , , , and . IberSPEECH, page 236-239. ISCA, (2018)Adversarial Attacks and Defenses for Speaker Identification Systems., , , , and . CoRR, (2021)