Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inductive and transductive link prediction for criminal network analysis, , , , , , , , and . Journal of Computational Science, (September 2023)Speaker Recognition on Mono-Channel Telephony Recordings., , , , and . Odyssey, page 193-199. ISCA, (2022)Selective Fusion for Speaker Verification in Surveillance., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 269-279. Springer, (2005)Virtual fusion for speaker recognition., and . INTERSPEECH, page 1997-2000. ISCA, (2007)Reducing Noise Bias in the i-Vector Space for Speaker Recognition., , and . Odyssey, page 372-376. ISCA, (2016)Online two speaker diarization., , and . Odyssey, page 122-129. ISCA, (2012)Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers., , , and . CoRR, (2016)Comparison of speaker recognition systems on a real forensic benchmark., , , and . Odyssey, page 86-91. ISCA, (2012)MOSQUITO: Covert Ultrasonic Transmissions Between Two Air-Gapped Computers Using Speaker-to-Speaker Communication., , and . DSC, page 1-8. IEEE, (2018)Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures., , , , , and . IEEE Access, (2019)