Author of the publication

Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data.

, , , and . INTERSPEECH, page 2611-2615. ISCA, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who Do I Sound Like? Showcasing Speaker Recognition Technology by YouTube Voice Search., , , , and . CoRR, (2018)Shout detection in noise., , and . ICASSP, page 4968-4971. IEEE, (2011)Spoofing and countermeasures for speaker verification: A survey., , , , , and . Speech Commun., (2015)Speaker Verification Across Ages: Investigating Deep Speaker Embedding Sensitivity to Age Mismatch in Enrollment and Test Speech., , and . CoRR, (2023)Improving speaker de-identification with functional data analysis of f0 trajectories., , and . CoRR, (2022)Mixture of Factor Analyzers Using Priors From Non-Parallel Speech for Voice Conversion., , , and . IEEE Signal Process. Lett., 19 (12): 914-917 (2012)Maximum a Posteriori Adaptation of the Centroid Model for Speaker Verification., , , , , and . IEEE Signal Process. Lett., (2008)Voice biometrics security: Extrapolating false alarm rate via hierarchical Bayesian modeling of speaker verification scores., , , and . Comput. Speech Lang., (2020)Generalizing Speaker Verification for Spoof Awareness in the Embedding Space., , , and . IEEE ACM Trans. Audio Speech Lang. Process., (2024)Optimizing Multi-Taper Features for Deep Speaker Verification., , and . CoRR, (2021)