Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gain Compensation for Fast i-Vector Extraction Over Short Duration., and . INTERSPEECH, page 1527-1531. ISCA, (2017)Maximal Figure-of-Merit Embedding for Multi-Label Audio Classification., , and . ICASSP, page 136-140. IEEE, (2018)An extensible speaker identification sidekit in Python., , and . ICASSP, page 5095-5099. IEEE, (2016)RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research., , , , , , , , , and 3 other author(s). ICASSP, page 5395-5399. IEEE, (2017)A hybrid modeling strategy for GMM-SVM speaker recognition with adaptive relevance factor., , and . INTERSPEECH, page 2746-2749. ISCA, (2010)Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints., , , , , and . INTERSPEECH, page 950-954. ISCA, (2013)Multi-session PLDA scoring of i-vector for partially open-set speaker detection., , , , and . INTERSPEECH, page 3651-3655. ISCA, (2013)Text-dependent speaker verification: Classifiers, databases and RSR2015., , , and . Speech Commun., (2014)Voice biometrics security: Extrapolating false alarm rate via hierarchical Bayesian modeling of speaker verification scores., , , and . Comput. Speech Lang., (2020)NEC-TT System for Mixed-Bandwidth and Multi-Domain Speaker Recognition., , , , , , , and . Comput. Speech Lang., (2020)