Author of the publication

ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge.

, , , , , , and . INTERSPEECH, page 2037-2041. ISCA, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems., , , , and . WIFS, page 1-9. IEEE, (2018)Speaker recognition from whispered speech: A tutorial survey and an application of time-varying linear prediction., , , , and . Speech Commun., (2018)Voice Mimicry Attacks Assisted by Automatic Speaker Verification., , , and . Comput. Speech Lang., (2020)UIAI System for Short-Duration Speaker Verification Challenge 2020., , , , , , , and . CoRR, (2020)Evaluating Voice Conversion-Based Privacy Protection against Informed Attackers., , , , , and . ICASSP, page 2802-2806. IEEE, (2020)An Adaptive i-Vector Extraction for Speaker Verification with Short Utterance., , and . PReMI, volume 10597 of Lecture Notes in Computer Science, page 326-332. Springer, (2017)On the use of perceptual Line Spectral pairs Frequencies and higher-order residual moments for Speaker Identification., , and . Int. J. Biom., 2 (4): 358-378 (2010)Voice Mimicry Attacks Assisted by Automatic Speaker Verification., , , and . CoRR, (2019)ASVspoof: The Automatic Speaker Verification Spoofing and Countermeasures Challenge., , , , , , , and . IEEE J. Sel. Top. Signal Process., 11 (4): 588-604 (2017)Integrated Presentation Attack Detection and Automatic Speaker Verification: Common Features and Gaussian Back-end Fusion., , , , , , and . INTERSPEECH, page 77-81. ISCA, (2018)