Author of the publication

The non-trusty clown attack on model-based speaker recognition systems.

, and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 940904. SPIE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Additive attacks on speaker recognition., and . Media Watermarking, Security, and Forensics, volume 9028 of SPIE Proceedings, page 90280Q. SPIE, (2014)A Negative Number Vulnerability for Histogram-based Face Recognition Systems., , and . IH&MMSec, page 155-160. ACM, (2015)Attacks on Speaker Identification Systems Constrained to Speech-to-Text Decoding., , and . Media Watermarking, Security, and Forensics, page 1-7. Society for Imaging Science and Technology, (2016)The non-trusty clown attack on model-based speaker recognition systems., and . Media Watermarking, Security, and Forensics, volume 9409 of SPIE Proceedings, page 940904. SPIE, (2015)