Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimized large vocabulary WFST speech recognition system., , , , and . FSKD, page 1243-1247. IEEE, (2012)Nonnative speech recognition based on state-candidate bilingual model modification., , , and . INTERSPEECH, page 2366-2369. ISCA, (2008)Prefix tree based n-best list re-scoring for recurrent neural network language model used in speech recognition system., , , , and . INTERSPEECH, page 3419-3423. ISCA, (2013)Simultaneous Synchronization of Text and Speech for Broadcast News Subtitling., , , and . ISNN (3), volume 5553 of Lecture Notes in Computer Science, page 576-585. Springer, (2009)Improved mandarin spoken term detection by using deep neural network for keyword verification., , , , and . ICNC, page 144-148. IEEE, (2014)Speeding up deep neural networks for speech recognition on ARM Cortex-A series processors., , , , , and . ICNC, page 123-127. IEEE, (2014)Recurrent neural network language model in mandarin voice input system., , , , and . ICNC, page 270-274. IEEE, (2012)A One-Pass Real-Time Decoder Using Memory-Efficient State Network., , , , and . IEICE Trans. Inf. Syst., 91-D (3): 529-537 (2008)FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT., , , and . IEEE Trans. Ind. Informatics, 19 (1): 940-950 (2023)A Blockchain-Based Machine Learning Framework for Edge Services in IIoT., , , , , and . IEEE Trans. Ind. Informatics, 18 (3): 1918-1929 (2022)