From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , и . SPECOM, том 9319 из Lecture Notes in Computer Science, стр. 480-486. Springer, (2015)Non-linear PLDA for i-vector speaker verification., , , , и . INTERSPEECH, стр. 214-218. ISCA, (2015)STC Speaker Recognition System for the NIST i-Vector Challenge., , и . Odyssey, ISCA, (2014)Anti-spoofing Methods for Automatic Speaker Verification System., , и . AIST, том 661 из Communications in Computer and Information Science, стр. 172-184. (2016)Audio-Replay Attack Detection Countermeasures., , , , , и . SPECOM, том 10458 из Lecture Notes in Computer Science, стр. 171-181. Springer, (2017)Text-dependent GMM-JFA system for password based speaker verification., , , и . ICASSP, стр. 729-733. IEEE, (2014)A Speaker Recognition System for the SITW Challenge., , , и . INTERSPEECH, стр. 833-837. ISCA, (2016)Speaker Diarization with Deep Speaker Embeddings for DIHARD Challenge II., , , , , , , и . INTERSPEECH, стр. 1003-1007. ISCA, (2019)On deep speaker embeddings for text-independent speaker recognition., , , , и . Odyssey, стр. 378-385. ISCA, (2018)STC Anti-spoofing Systems for the ASVspoof 2015 Challenge., , , , и . CoRR, (2015)