Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals., , , , , , , , , and 1 other author(s). IEEE ACM Trans. Audio Speech Lang. Process., (2020)Generalized Variability Model for Speaker Verification., , , and . IEEE Signal Process. Lett., 25 (12): 1775-1779 (2018)Quasi-Factorial Prior for i-vector Extraction., , , and . IEEE Signal Process. Lett., 22 (12): 2484-2488 (2015)Improving convergence of the NLMS algorithm using constrained subband updates., and . IEEE Signal Process. Lett., 11 (9): 736-739 (2004)Spoken Language Recognition: From Fundamentals to Practice., , and . Proc. IEEE, 101 (5): 1136-1159 (2013)PLDA in the I-Supervector Space for Text-Independent Speaker Verification., , and . EURASIP J. Audio Speech Music. Process., (2014)Generalized Domain Adaptation Framework for Parametric Back-End in Speaker Recognition., , , and . IEEE Trans. Inf. Forensics Secur., (2023)Exploration of Local Variability in Text-Independent Speaker Verification., , , , , and . J. Signal Process. Syst., 82 (2): 217-228 (2016)Towards single integrated spoofing-aware speaker verification embeddings., , , , , , , , , and 5 other author(s). CoRR, (2023)Golden Gemini is All You Need: Finding the Sweet Spots for Speaker Verification., , , and . CoRR, (2023)