Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parameter Optimization in a Text-Dependent Cryptographic-Speech-Key Generation Task., , and . NOLISP, volume 3817 of Lecture Notes in Computer Science, page 92-99. Springer, (2005)Optimization of the DET curve in speaker verification., , , and . SLT, page 318-323. IEEE, (2012)Using PCA to Improve the Generation of Speech Keys., , , and . MICAI, volume 4293 of Lecture Notes in Computer Science, page 1085-1094. Springer, (2006)Cryptographic-Speech-Key Generation Architecture Improvements., , and . IbPRIA (2), volume 3523 of Lecture Notes in Computer Science, page 579-585. Springer, (2005)Advances in Cross-Lingual and Cross-Source Audio-Visual Speaker Recognition: The JHU-MIT System for NIST SRE21., , , , , , , , and . Odyssey, page 213-220. ISCA, (2022)Feature Enhancement with Deep Feature Losses for Speaker Verification., , , , , and . ICASSP, page 7584-7588. IEEE, (2020)Phoneme Spotting for Speech-Based Crypto-key Generation., , and . CIARP, volume 3773 of Lecture Notes in Computer Science, page 770-777. Springer, (2005)Speaker Verification in Different Database Scenarios., , and . Computación y Sistemas, (2011)Multi-speaker voice cryptographic key generation., , and . AICCSA, page 93. IEEE Computer Society, (2005)Unsupervised Feature Enhancement for Speaker Verification., , , , and . ICASSP, page 7599-7603. IEEE, (2020)