Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Regulation in Switched Bimodal Systems: An Experimental Evaluation., and . IEEE Trans. Control. Syst. Technol., 18 (4): 885-895 (2010)CoAVT: A Cognition-Inspired Unified Audio-Visual-Text Pre-Training Model for Multimodal Processing., , , , and . CoRR, (2024)Exemplar-based voice conversion using joint nonnegative matrix factorization., , and . Multim. Tools Appl., 74 (22): 9943-9958 (2015)Towards Zero-Shot Multi-Speaker Multi-Accent Text-to-Speech Synthesis., , , and . IEEE Signal Process. Lett., (2023)ASVspoof: The Automatic Speaker Verification Spoofing and Countermeasures Challenge., , , , , , , and . IEEE J. Sel. Top. Signal Process., 11 (4): 588-604 (2017)Audio Splicing Localization: Can We Accurately Locate the Splicing Tampering?, and . ISCSLP, page 120-124. IEEE, (2022)Voice conversion and spoofing attack on speaker verification systems., and . APSIPA, page 1-9. IEEE, (2013)Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech., , , , , and . ICASSP, page 4401-4404. IEEE, (2012)SAS: A speaker verification spoofing database containing diverse attacks., , , , , , and . ICASSP, page 4440-4444. IEEE, (2015)Spoofing detection from a feature representation perspective., , , , and . ICASSP, page 2119-2123. IEEE, (2016)