128 results on '"Kinnunen, Tomi"'
Search Results
2. Towards Single Integrated Spoofing-aware Speaker Verification Embeddings
3. How to Construct Perfect and Worse-than-Coin-Flip Spoofing Countermeasures: A Word of Warning on Shortcut Learning
4. Speaker-Aware Anti-spoofing
5. Multi-Dataset Co-Training with Sharpness-Aware Optimization for Audio Anti-spoofing
6. Learnable Frontends That Do Not Learn: Quantifying Sensitivity To Filterbank Initialisation
7. SASV 2022: The First Spoofing-Aware Speaker Verification Challenge
8. Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion
9. Spoofing-Aware Speaker Verification with Unsupervised Domain Adaptation
10. Baselines and Protocols for Household Speaker Recognition
11. Gamified Speaker Comparison by Listening
12. Learnable Nonlinear Compression for Robust Speaker Verification
13. Voxceleb Enrichment for Age and Gender Recognition
14. Optimized Power Normalized Cepstral Coefficients Towards Robust Deep Speaker Verification
15. Parameterized Channel Normalization for Far-Field Deep Speaker Verification
16. Benchmarking and challenges in security and privacy for voice biometrics
17. ASVspoof 2021: accelerating progress in spoofed and deepfake speech detection
18. Visualizing Classifier Adjacency Relations: A Case Study in Speaker Verification and Voice Anti-Spoofing
19. Data Quality as Predictor of Voice Anti-Spoofing Generalization
20. Learnable MFCCs for Speaker Verification
21. UIAI System for Short-Duration Speaker Verification Challenge 2020
22. An Initial Investigation on Optimizing Tandem Speaker Verification and Countermeasure Systems Using Reinforcement Learning
23. Subband Modeling for Spoofing Detection in Automatic Speaker Verification
24. Neural i-vectors
25. Voice Conversion Challenge 2020 –- Intra-lingual semi-parallel and cross-lingual voice conversion –-
26. Predictions of Subjective Ratings and Spoofing Assessments of Voice Conversion Challenge 2020 Submissions
27. Extrapolating False Alarm Rates in Automatic Speaker Verification
28. The Attacker’s Perspective on Automatic Speaker Verification: An Overview
29. Why Did the x-Vector System Miss a Target Speaker? Impact of Acoustic Mismatch Upon Target Score on VoxCeleb Data
30. A Comparative Re-Assessment of Feature Extractors for Deep Speaker Embeddings
31. Towards Controlling False Alarm - Miss Trade-Off in Perceptual Speaker Comparison via Non-Neutral Listening Task Framing
32. Unleashing the Unused Potential of i-Vectors Enabled by GPU Acceleration
33. ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection
34. I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences
35. Audio-Visual Kinship Verification in the Wild
36. Who Do I Sound like? Showcasing Speaker Recognition Technology by Youtube Voice Search
37. Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection
38. Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems
39. Waveform to Single Sinusoid Regression to Estimate the F0 Contour from Noisy Speech Using Recurrent Deep Neural Networks
40. Integrated Presentation Attack Detection and Automatic Speaker Verification: Common Features and Gaussian Back-end Fusion
41. Audiovisual Synchrony Detection with Optimized Audio Features
42. A Spoofing Benchmark for the 2018 Voice Conversion Challenge: Leveraging from Spoofing Countermeasures for Speech Artifact Assessment
43. Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data
44. Supervector Compression Strategies to Speed up I-Vector System Development
45. A Regression Model of Recurrent Deep Neural Networks for Noise Robust Estimation of the Fundamental Frequency Contour of Speech
46. t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification
47. The Voice Conversion Challenge 2018: Promoting Development of Parallel and Nonparallel Methods
48. Perceptual Evaluation of the Effectiveness of Voice Disguise by Age Modification
49. ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements
50. Impact of Bandwidth and Channel Variation on Presentation Attack Detection for Speaker Verification
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.