Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new approach to channel robust speaker verification via constrained stochastic feature transformation., , , and . INTERSPEECH, page 1753-1756. ISCA, (2004)Robust speaker verification from GSM-transcoded speech based on decision fusion and feature transformation., , and . ICASSP (2), page 745-748. IEEE, (2003)Multi-sample data-dependent fusion of sorted score sequences for biometric verification., , and . ICASSP (5), page 681-684. IEEE, (2004)Multi-sample fusion with constrained feature transformation for robust speaker verification., , , and . INTERSPEECH, page 1813-1816. ISCA, (2004)Adaptive decision fusion for multi-sample speaker verification over GSM networks., , and . INTERSPEECH, page 2969-2972. ISCA, (2003)A two-level fusion approach to multimodal biometric verification., , and . ICASSP (5), page 485-488. IEEE, (2005)Social Network Analytic-Based Online Counterfeit Seller Detection using User Shared Images., , , and . ACM Trans. Multim. Comput. Commun. Appl., 19 (1): 23:1-23:18 (January 2023)Discovering Social Connections using Event Images., , and . MMAsia, page 68:1-68:5. ACM, (2021)Detecting Online Counterfeit-goods Seller using Connection Discovery., , , and . ACM Trans. Multim. Comput. Commun. Appl., 15 (2): 35:1-35:16 (2019)Factors Affecting the Design of Electronic Direct Mail Messages: Implications for Professional Communicators.. IEEE Trans. Prof. Commun., 54 (3): 279-298 (2011)