Author of the publication

Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks.

, , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-spoofing Methods for Automatic SpeakerVerification System., , and . CoRR, (2017)Usage of DNN in Speaker Recognition: Advantages and Problems., , , , and . ISNN, volume 9719 of Lecture Notes in Computer Science, page 82-91. Springer, (2016)STC anti-spoofing systems for the ASVspoof 2015 challenge., , , , and . ICASSP, page 5475-5479. IEEE, (2016)"STC spoofing" database for text-dependent speaker recognition evaluation., and . SLTU, page 221-224. ISCA, (2014)Supervized Mixture of PLDA Models for Cross-Channel Speaker Verification., , , and . INTERSPEECH, page 1684-1687. ISCA, (2012)A Speaker Recognition System for the SITW Challenge., , , and . INTERSPEECH, page 833-837. ISCA, (2016)Automatic Preprocessing Technique for Detection of Corrupted Speech Signal Fragments for the Purpose of Speaker Recognition., , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 121-128. Springer, (2015)The ID R&D System Description for Short-Duration Speaker Verification Challenge 2021., , , , , and . Interspeech, page 2297-2301. ISCA, (2021)Effective estimation of a multi-session speaker model using information on signal parameters., , and . INTERSPEECH, page 1604-1608. ISCA, (2013)STC Anti-spoofing Systems for the ASVspoof 2015 Challenge., , , , and . CoRR, (2015)