Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defense against Adversarial Attacks on Hybrid Speech Recognition using Joint Adversarial Fine-tuning with Denoiser., , , , , , and . CoRR, (2022)Frustratingly Easy Noise-aware Training of Acoustic Models., , , and . CoRR, (2020)Adversarial Attacks and Defenses for Speaker Identification Systems., , , , and . CoRR, (2021)State-of-the-art speaker recognition with neural network embeddings in NIST SRE18 and Speakers in the Wild evaluations., , , , , , , , , and 2 other author(s). Comput. Speech Lang., (2020)Tied Variational Autoencoder Backends for i-Vector Speaker Recognition., , and . INTERSPEECH, page 1004-1008. ISCA, (2017)ASSERT: Anti-Spoofing with Squeeze-Excitation and Residual Networks., , , and . INTERSPEECH, page 1013-1017. ISCA, (2019)Preventing replay attacks on speaker verification systems., and . ICCST, page 1-8. IEEE, (2011)Joint domain adaptation and speech bandwidth extension using time-domain GANs for speaker verification., , , and . INTERSPEECH, page 615-619. ISCA, (2022)Defense against Adversarial Attacks on Hybrid Speech Recognition System using Adversarial Fine-tuning with Denoiser., , , , , , and . INTERSPEECH, page 5035-5039. ISCA, (2022)Chunking Defense for Adversarial Attacks on ASR., , , , , and . INTERSPEECH, page 5045-5049. ISCA, (2022)