Author:
Gałka Jakub,Grzywacz Marcin,Samborski Rafał
Subject
Computer Science Applications,Computer Vision and Pattern Recognition,Linguistics and Language,Language and Linguistics,Communication,Modeling and Simulation,Software
Reference20 articles.
1. Ariyaeeinia, A.M., Sivakumaran, P., 1997. Analysis and comparison of score normalisation methods for text-dependent speaker verification. In: Kokkinakis, G., Fakotakis, N., Dermatas, E. (Eds.), EUROSPEECH, ISCA.
2. Barras, C., Gauvain, J., 2003. Feature and score normalization for speaker verification of cellular data. In: 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP ’03), vol. 2, pp. II–49–52. doi:http://dx.doi.org/10.1109/ICASSP.2003.1202291.
3. Boves, L., den Os, E., 1998. Speaker recognition in telecom applications. In: 1998 IEEE 4th Workshop on Interactive Voice Technology for Telecommunications Applications, 1998. IVTTA ’98. Proceedings, pp. 203–208. doi:http://dx.doi.org/10.1109/IVTTA.1998.727721.
4. Ellis, D., 2009. Robust landmark-based audio fingerprinting. .
5. Kinnunen, T., Wu, Z., Lee, K.A., Sedlak, F., Chng, E.S., Li, H. 2012. Vulnerability of speaker verification systems against voice conversion spoofing attacks: the case of telephone speech. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2012, pp. 4401–4404. doi:http://dx.doi.org/10.1109/ICASSP.2012.6288895.
Cited by
45 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献