Author:
Kemanth P. J.,Supanekar Sujata,Koolagudi Shashidhar G.
Publisher
Springer International Publishing
Reference17 articles.
1. Brümmer, N., De Villiers, E.: The bosaris toolkit: theory, algorithms and code for surviving the new dcf. arXiv preprint
arXiv:1304.2865
(2013)
2. Chen, Z., Zhang, W., Xie, Z., Xu, X., Chen, D.: Recurrent neural networks for automatic replay spoofing attack detection. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2052–2056. IEEE (2018)
3. Deng, L., Hinton, G., Kingsbury, B.: New types of deep neural network learning for speech recognition and related applications: an overview. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 8599–8603. IEEE (2013)
4. Faundez-Zanuy, M.: On the vulnerability of biometric security systems. IEEE Aerosp. Electron. Syst. Mag. 19(6), 3–8 (2004)
5. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint
arXiv:1412.6980
(2014)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Downsampling Attack on Automatic Speaker Authentication System;2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA);2021-11