Author of the publication

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks.

, , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Audio-Replay Attack Detection Countermeasures., , , , , and . SPECOM, volume 10458 of Lecture Notes in Computer Science, page 171-181. Springer, (2017)Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)Anti-spoofing Methods for Automatic Speaker Verification System., , and . AIST, volume 661 of Communications in Computer and Information Science, page 172-184. (2016)Deep CNN Based Feature Extractor for Text-Prompted Speaker Recognition., , , , and . ICASSP, page 5334-5338. IEEE, (2018)Light CNN Architecture Enhancement for Different Types Spoofing Attack Detection., , , , and . SPECOM, volume 11658 of Lecture Notes in Computer Science, page 520-529. Springer, (2019)Automatic Preprocessing Technique for Detection of Corrupted Speech Signal Fragments for the Purpose of Speaker Recognition., , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 121-128. Springer, (2015)Universal Speaker Recognition Encoders for Different Speech Segments Duration., , and . ICASSP, page 1-5. IEEE, (2023)Deep Speaker Embeddings for Far-Field Speaker Recognition on Short Utterances., , , , , , , , , and 4 other author(s). Odyssey, page 179-186. ISCA, (2020)Phonespoof: A New Dataset for Spoofing Attack Detection in Telephone Channel., , , , and . ICASSP, page 2572-2576. IEEE, (2019)Strategy of the Negative Sampling for Training Retrieval-Based Dialogue Systems., , , and . PerCom Workshops, page 844-848. IEEE, (2019)