Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Jacobian adaptation based on the frequency-filtered spectral energies., , , and . INTERSPEECH, page 1621-1624. ISCA, (2003)Exploring Dementia Detection from Speech: Cross Corpus Analysis., , , , and . ICASSP, page 6472-6476. IEEE, (2022)Parallel Transformation Network features for speaker recognition., , and . ICASSP, page 5300-5303. IEEE, (2011)The DIRHA Portuguese Corpus: A Comparison of Home Automation Command Detection and Recognition in Simulated and Real Data., , and . LREC, European Language Resources Association (ELRA), (2016)Multimodal Head Orientation Towards Attention Tracking in Smartrooms., , , , and . ICASSP (2), page 681-684. IEEE, (2007)Preventing converted speech spoofing attacks in speaker verification., , and . MIPRO, page 1320-1325. IEEE, (2014)Algorithm 924: TIDES, a Taylor Series Integrator for Differential EquationS., , , and . ACM Trans. Math. Softw., 39 (1): 5:1-5:28 (2012)Improved Jacobian Adaptation for Robust Speaker Verification., , and . IEICE Trans. Inf. Syst., 88-D (7): 1767-1770 (2005)Privacy-preserving speaker verification using garbled GMMS., , , and . EUSIPCO, page 2070-2074. IEEE, (2014)Exploring Hashing and Cryptonet Based Approaches for Privacy-Preserving Speech Emotion Recognition., , and . ICASSP, page 2057-2061. IEEE, (2018)