Author of the publication

Fusion of multiple parameterisations for DNN-based sinusoidal speech synthesis with multi-task learning.

, , , , , and . INTERSPEECH, page 854-858. ISCA, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Voice conversion and spoofing attack on speaker verification systems., and . APSIPA, page 1-9. IEEE, (2013)Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech., , , , , and . ICASSP, page 4401-4404. IEEE, (2012)Improved prosody generation by maximizing joint likelihood of state and longer units., , and . ICASSP, page 3781-3784. IEEE, (2009)SAS: A speaker verification spoofing database containing diverse attacks., , , , , , and . ICASSP, page 4440-4444. IEEE, (2015)Spoofing detection from a feature representation perspective., , , , and . ICASSP, page 2119-2123. IEEE, (2016)Robust TTS duration modelling using DNNS., , , , , and . ICASSP, page 5130-5134. IEEE, (2016)Efficient architecture for soft-output massive MIMO detection with Gauss-Seidel method., , , , and . ISCAS, page 1886-1889. IEEE, (2016)Cross-Lingual Voice Conversion with a Cycle Consistency Loss on Linguistic Representation., , , and . Interspeech, page 1374-1378. ISCA, (2021)Automatic speaker verification spoofing and countermeasures (ASVspoof 2015): introductory talk by the organizers., and . INTERSPEECH, ISCA, (2015)Exemplar-based unit selection for voice conversion utilizing temporal information., , , , and . INTERSPEECH, page 3057-3061. ISCA, (2013)