Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JHU Diarization System Description., , , , and . IberSPEECH, page 236-239. ISCA, (2018)Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)Measuring Uncertainty in Deep Regression Models: The Case of Age Estimation from Speech., , , and . ICASSP, page 4939-4943. IEEE, (2018)Hierarchical Transformers for Long Document Classification., , , , and . ASRU, page 838-844. IEEE, (2019)Black-Box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples., , , and . INTERSPEECH, page 4238-4242. ISCA, (2020)Segmental SpeechCLIP: Utilizing Pretrained Image-text Models for Audio-Visual Learning., , , , and . INTERSPEECH, page 431-435. ISCA, (2023)Spine2Net: SpineNet with Res2Net and Time-Squeeze-and-Excitation Blocks for Speaker Recognition., , , , and . Interspeech, page 496-500. ISCA, (2021)Towards Speech Processing Robust to Adversarial Deceptions.. Odyssey, ISCA, (2024)Discovering Invariant Patterns of Cognitive Decline Via an Automated Analysis of the Cookie Thief Picture Description Task., , , , , and . Odyssey, page 201-208. ISCA, (2024)Frustratingly Easy Noise-aware Training of Acoustic Models., , , and . CoRR, (2020)