From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection., , , и . ICASSP, стр. 6146-6150. IEEE, (2019)Automatic versus human speaker verification: The case of voice mimicry., , , и . Speech Commun., (2015)Articulation During Voice Disguise: A Pilot Study., , , , и . SPECOM, том 12997 из Lecture Notes in Computer Science, стр. 680-691. Springer, (2021)I-vectors meet imitators: on vulnerability of speaker verification systems against voice mimicry., , , , и . INTERSPEECH, стр. 930-934. ISCA, (2013)Improving speaker de-identification with functional data analysis of f0 trajectories., , и . CoRR, (2022)RedDots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research., , , , , , , , , и 3 other автор(ы). ICASSP, стр. 5395-5399. IEEE, (2017)Acoustical and perceptual study of voice disguise by age modification in speaker verification., , , и . Speech Commun., (2017)Robust Voice Liveness Detection and Speaker Verification Using Throat Microphones., , , , , , и . IEEE ACM Trans. Audio Speech Lang. Process., 26 (1): 44-56 (2018)Gamified Speaker Comparison by Listening., , и . Odyssey, стр. 421-427. ISCA, (2022)Merging human and automatic system decisions to improve speaker recognition performance., , , и . INTERSPEECH, стр. 2519-2523. ISCA, (2013)