Author of the publication

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks.

, , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)A Simple Harmonic Model for FAPAR Temporal Dynamics in the Wetlands of the Volga-Akhtuba Floodplain., , and . Remote Sensing, 8 (9): 762 (2016)Angular Misalignment Calibration for Dual-Antenna GNSS/IMU Navigation Sensor., and . Sensors, 23 (1): 77 (2023)Neural Network Compression Framework for Fast Model Inference., , , , and . SAI (3), volume 285 of Lecture Notes in Networks and Systems, page 213-232. Springer, (2021)SVID Speaker Recognition System for NIST SRE 2012., , , , , and . SPECOM, volume 8113 of Lecture Notes in Computer Science, page 278-285. Springer, (2013)Lightweight network architecture for real-time action recognition., , and . SAC, page 2074-2080. ACM, (2020)STC speaker recognition systems for the NIST SRE 2021., , , , , , , , , and 2 other author(s). CoRR, (2021)Triplet Loss Based Cosine Similarity Metric Learning for Text-independent Speaker Recognition., , , , and . INTERSPEECH, page 2242-2246. ISCA, (2018)Blind Speech Signal Quality Estimation for Speaker Verification Systems., , , , , , , and . INTERSPEECH, page 1535-1539. ISCA, (2020)STC anti-spoofing systems for the ASVspoof 2015 challenge., , , , and . ICASSP, page 5475-5479. IEEE, (2016)