Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)Non-linear PLDA for i-vector speaker verification., , , , and . INTERSPEECH, page 214-218. ISCA, (2015)STC Speaker Recognition System for the NIST i-Vector Challenge., , and . Odyssey, ISCA, (2014)Anti-spoofing Methods for Automatic Speaker Verification System., , and . AIST, volume 661 of Communications in Computer and Information Science, page 172-184. (2016)Audio-Replay Attack Detection Countermeasures., , , , , and . SPECOM, volume 10458 of Lecture Notes in Computer Science, page 171-181. Springer, (2017)Text-dependent GMM-JFA system for password based speaker verification., , , and . ICASSP, page 729-733. IEEE, (2014)A Speaker Recognition System for the SITW Challenge., , , and . INTERSPEECH, page 833-837. ISCA, (2016)Speaker Diarization with Deep Speaker Embeddings for DIHARD Challenge II., , , , , , , and . INTERSPEECH, page 1003-1007. ISCA, (2019)On deep speaker embeddings for text-independent speaker recognition., , , , and . Odyssey, page 378-385. ISCA, (2018)Comparative Analysis of Classifiers for Automatic Language Recognition in Spontaneous Speech., , and . SPECOM, volume 9811 of Lecture Notes in Computer Science, page 174-181. Springer, (2016)