Author of the publication

"STC spoofing" database for text-dependent speaker recognition evaluation.

, and . SLTU, page 221-224. ISCA, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-spoofing Methods for Automatic SpeakerVerification System., , and . CoRR, (2017)Usage of DNN in Speaker Recognition: Advantages and Problems., , , , and . ISNN, volume 9719 of Lecture Notes in Computer Science, page 82-91. Springer, (2016)STC anti-spoofing systems for the ASVspoof 2015 challenge., , , , and . ICASSP, page 5475-5479. IEEE, (2016)Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)Examining Vulnerability of Voice Verification Systems to Spoofing Attacks by Means of a TTS System., and . SPECOM, volume 8113 of Lecture Notes in Computer Science, page 132-137. Springer, (2013)STC Speaker Recognition System for the NIST i-Vector Challenge., , and . Odyssey, ISCA, (2014)Anti-spoofing Methods for Automatic Speaker Verification System., , and . AIST, volume 661 of Communications in Computer and Information Science, page 172-184. (2016)SVID Speaker Recognition System for NIST SRE 2012., , , , , and . SPECOM, volume 8113 of Lecture Notes in Computer Science, page 278-285. Springer, (2013)"STC spoofing" database for text-dependent speaker recognition evaluation., and . SLTU, page 221-224. ISCA, (2014)Supervized Mixture of PLDA Models for Cross-Channel Speaker Verification., , , and . INTERSPEECH, page 1684-1687. ISCA, (2012)