Author of the publication

Articulation During Voice Disguise: A Pilot Study.

, , , , and . SPECOM, volume 12997 of Lecture Notes in Computer Science, page 680-691. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection., , , and . ICASSP, page 6146-6150. IEEE, (2019)Automatic versus human speaker verification: The case of voice mimicry., , , and . Speech Commun., (2015)I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry., , , , and . INTERSPEECH, page 930-934. ISCA, (2013)Articulation During Voice Disguise: A Pilot Study., , , , and . SPECOM, volume 12997 of Lecture Notes in Computer Science, page 680-691. Springer, (2021)Robust Voice Liveness Detection and Speaker Verification Using Throat Microphones., , , , , , and . IEEE ACM Trans. Audio Speech Lang. Process., 26 (1): 44-56 (2018)Acoustical and perceptual study of voice disguise by age modification in speaker verification., , , and . Speech Commun., (2017)Data Quality as Predictor of Voice Anti-Spoofing Generalization., , , and . Interspeech, page 1659-1663. ISCA, (2021)Merging human and automatic system decisions to improve speaker recognition performance., , , and . INTERSPEECH, page 2519-2523. ISCA, (2013)Gamified Speaker Comparison by Listening., , and . Odyssey, page 421-427. ISCA, (2022)Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection., , , and . CoRR, (2018)