Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep CNN Based Feature Extractor for Text-Prompted Speaker Recognition., , , , and . ICASSP, page 5334-5338. IEEE, (2018)STC anti-spoofing systems for the ASVspoof 2015 challenge., , , , and . ICASSP, page 5475-5479. IEEE, (2016)Triplet Loss Based Cosine Similarity Metric Learning for Text-independent Speaker Recognition., , , , and . INTERSPEECH, page 2242-2246. ISCA, (2018)Audio-Replay Attack Detection Countermeasures., , , , , and . SPECOM, volume 10458 of Lecture Notes in Computer Science, page 171-181. Springer, (2017)"STC spoofing" database for text-dependent speaker recognition evaluation., and . SLTU, page 221-224. ISCA, (2014)On deep speaker embeddings for text-independent speaker recognition., , , , and . Odyssey, page 378-385. ISCA, (2018)Improving the Quality of Automatic Speech Recognition in Trucks., , and . SPECOM, volume 9811 of Lecture Notes in Computer Science, page 362-369. Springer, (2016)Examining Vulnerability of Voice Verification Systems to Spoofing Attacks by Means of a TTS System., and . SPECOM, volume 8113 of Lecture Notes in Computer Science, page 132-137. Springer, (2013)Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)Voice Passphrase Variability Evaluation for Speaker Recognition., , and . IWCF, volume 8915 of Lecture Notes in Computer Science, page 3-9. Springer, (2014)