Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems., , , , and . WIFS, page 1-9. IEEE, (2018)Impact of Bandwidth and Channel Variation on Presentation Attack Detection for Speaker Verification., , , , , , , and . BIOSIG, volume P-270 of LNI, page 173-183. GI / IEEE, (2017)An Adaptive i-Vector Extraction for Speaker Verification with Short Utterance., , and . PReMI, volume 10597 of Lecture Notes in Computer Science, page 326-332. Springer, (2017)Evaluating Voice Conversion-Based Privacy Protection against Informed Attackers., , , , , and . ICASSP, page 2802-2806. IEEE, (2020)Cross-Corpora Spoken Language Identification with Domain Diversification and Generalization., , and . CoRR, (2023)Exploring Green AI for Audio Deepfake Detection., , and . CoRR, (2024)Robust Speaker Recognition with Combined Use of Acoustic and Throat Microphone Speech., , , , , , , and . INTERSPEECH, page 1720-1724. ISCA, (2016)HAPPY Team Entry to NIST OpenSAD Challenge: A Fusion of Short-Term Unsupervised and Segment i-Vector Based Speech Activity Detectors., , , , , and . INTERSPEECH, page 2992-2996. ISCA, (2016)Improving Speaker Verification Performance in Presence of Spoofing Attacks Using Out-of-Domain Spoofed Data., , , and . INTERSPEECH, page 2611-2615. ISCA, (2017)Speaker-Aware Anti-spoofing., , , and . INTERSPEECH, page 2498-2502. ISCA, (2023)