Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Unsupervised Method for Detection and Validation of The Optic Disc and The Fovea., , and . CoRR, (2016)VeritasDB: High Throughput Key-Value Store with Integrity., and . IACR Cryptology ePrint Archive, (2018)Verification of Quantitative Hyperproperties Using Trace Enumeration Relations., , and . CAV (1), volume 12224 of Lecture Notes in Computer Science, page 201-224. Springer, (2020)Improving Speech Transcription for Mandarin-English Translation., , , , , , , and . ICASSP (4), page 97-100. IEEE, (2007)A Study of Filter Bank Smoothing in MFCC Features for Recognition of Children's Speech., and . IEEE Trans. Speech Audio Process., 15 (8): 2418-2430 (2007)Investigating Target Set Reduction for End-to-End Speech Recognition of Hindi-English Code-Switching Data., , , and . NCC, page 1-5. IEEE, (2020)Improving children's mismatched ASR using structured low-rank feature projection., , , and . Speech Commun., (2018)Low-complexity speaker verification with decimated supervector representations., and . Speech Commun., (2015)A New Framework for Artificial Bandwidth Extension Using H∞ Filtering., , and . Circuits Syst. Signal Process., 41 (5): 2898-2922 (2022)Anomaly Detection Using System Logs: A Deep Learning Approach., , , and . Int. J. Inf. Secur. Priv., 16 (1): 1-15 (2022)