Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inductive and transductive link prediction for criminal network analysis., , , , , , , , and . J. Comput. Sci., (September 2023)Speaker Recognition on Mono-Channel Telephony Recordings., , , , and . Odyssey, page 193-199. ISCA, (2022)MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication., , and . DSC, page 1-8. IEEE, (2018)Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures., , , , , and . IEEE Access, (2019)Considering speech quality in speaker verification fusion., and . INTERSPEECH, page 2189-2192. ISCA, (2005)Null-Hypothesis LLR: A Proposal for Forensic Automatic Speaker Recognition., , and . INTERSPEECH, page 2849-2853. ISCA, (2017)SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit., , , and . WOOT, USENIX Association, (2017)Selective Fusion for Speaker Verification in Surveillance., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 269-279. Springer, (2005)DiskFiltration: Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise., , , and . CoRR, (2016)Virtual fusion for speaker recognition., and . INTERSPEECH, page 1997-2000. ISCA, (2007)