
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2021
- Yang Gao, Jiachen Lian, Bhiksha Raj, Rita Singh:
Detection and Evaluation of Human and Machine Generated Speech in Spoofing Attacks on Automatic Speaker Verification Systems. SLT 2021: 544-551 - 2020
- Sung-Hyun Yoon
, Min-Sung Koh, Jae-Han Park, Ha-Jin Yu
:
A New Replay Attack Against Automatic Speaker Verification Systems. IEEE Access 8: 36080-36088 (2020) - Pavol Partila
, Jaromir Tovarek, Hakki Gökhan Ilk, Jan Rozhon, Miroslav Voznák:
Deep Learning Serves Voice Cloning: How Vulnerable Are Automatic Speaker Verification Systems to Spoofing Trials? IEEE Commun. Mag. 58(2): 100-105 (2020) - Yang Gao, Jiachen Lian, Bhiksha Raj, Rita Singh:
Detection and Evaluation of human and machine generated speech in spoofing attacks on automatic speaker verification systems. CoRR abs/2011.03689 (2020) - Yuanjun Zhao, Roberto Togneri, Victor Sreeram:
Multi-task Learning Based Spoofing-Robust Automatic Speaker Verification System. CoRR abs/2012.03154 (2020) - 2019
- João Monteiro, Md. Jahangir Alam:
Development of Voice Spoofing Detection Systems for 2019 Edition of Automatic Speaker Verification and Countermeasures Challenge. ASRU 2019: 1003-1010 - B. Shaik Mohammad Rafi, K. Sri Rama Murty
:
Importance of Analytic Phase of the Speech Signal for Detecting Replay Attacks in Automatic Speaker Verification Systems. ICASSP 2019: 6306-6310 - Su-Yu Chang, Kai-Cheng Wu, Chia-Ping Chen:
Transfer-Representation Learning for Detecting Spoofing Attacks with Converted and Synthesized Speech in Automatic Speaker Verification System. INTERSPEECH 2019: 1063-1067 - 2018
- Hong Yu
, Zheng-Hua Tan
, Zhanyu Ma
, Rainer Martin
, Jun Guo:
Spoofing Detection in Automatic Speaker Verification Systems Using DNN Classifiers and Dynamic Acoustic Features. IEEE Trans. Neural Networks Learn. Syst. 29(10): 4633-4644 (2018) - Hemant A. Patil, Madhu R. Kamble:
A Survey on Replay Attack Detection for Automatic Speaker Verification (ASV) System. APSIPA 2018: 1047-1053 - Hye-jin Shim, Jee-weon Jung, Hee-Soo Heo, Sung-Hyun Yoon, Ha-Jin Yu:
Replay Spoofing Detection System for Automatic Speaker Verification Using Multi-Task Learning of Noise Classes. TAAI 2018: 172-176 - 2016
- Galina Lavrentyeva, Sergey Novoselov, Konstantin Simonchik:
Anti-spoofing Methods for Automatic Speaker Verification System. AIST 2016: 172-184 - Elena Bulgakova, Aleksey Sholohov:
Semi-automatic Speaker Verification System Based on Analysis of Formant, Durational and Pitch Characteristics. SPECOM 2016: 613-619 - Ivan Rakhmanenko
, Roman V. Meshcheryakov
:
Speech Features Evaluation for Small Set Automatic Speaker Verification Using GMM-UBM System. SPECOM 2016: 645-650 - 2015
- Shitao Weng, Shushan Chen, Lei Yu, Xuewei Wu, Weicheng Cai, Zhi Liu, Yiming Zhou, Ming Li:
The SYSU system for the interspeech 2015 automatic speaker verification spoofing and countermeasures challenge. APSIPA 2015: 152-155 - Md. Jahangir Alam, Patrick Kenny, Gautam Bhattacharya, Themos Stafylakis:
Development of CRIM system for the automatic speaker verification spoofing and countermeasures challenge 2015. INTERSPEECH 2015: 2072-2076 - Shitao Weng, Shushan Chen, Lei Yu, Xuewei Wu, Weicheng Cai, Zhi Liu, Ming Li:
The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge. CoRR abs/1507.06711 (2015) - 2006
- Roman Goldenberg, Arnon Cohen, Ilan Shallom:
The Lombard Effect's Influence on Automatic Speaker Verification Systems and Methods for its Compensation. ITRE 2006: 233-237 - 1999
- Dominique Genoud, Gérard Chollet:
Deliberate imposture: a challenge for automatic speaker verification systems. EUROSPEECH 1999 - 1988
- Joseph B. Attili, Michael Savic, Joseph P. Campbell Jr.:
A TMs32020-based real time, text-independent, automatic speaker verification system. ICASSP 1988: 599-602 - 1984
- David E. Crabbs, John R. Clymer:
Operational evaluation modeling of automatic speaker verification systems. Winter Simulation Conference 1984: 752-761 - 1980
- Sadaoki Furui, Aaron E. Rosenberg:
Experimental studies in a new automatic speaker verification system using telephone speech. ICASSP 1980: 1060-1062 - 1976
- Aaron E. Rosenberg:
Evaluation of an automatic speaker-verification system over telephone lines. Bell Syst. Tech. J. 55(6): 723-744 (1976)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-13 19:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint