Search

Your search keyword '"Tomi Kinnunen"' showing total 32 results

Search Constraints

Start Over You searched for: Author "Tomi Kinnunen" Remove constraint Author: "Tomi Kinnunen" Publisher isca Remove constraint Publisher: isca
32 results on '"Tomi Kinnunen"'

Search Results

1. Neural i-vectors

2. Subband Modeling for Spoofing Detection in Automatic Speaker Verification

4. A Comparative Re-Assessment of Feature Extractors for Deep Speaker Embeddings

5. The Attacker’s Perspective on Automatic Speaker Verification: An Overview

6. I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences

7. The Voice Conversion Challenge 2018: Promoting Development of Parallel and Nonparallel Methods

8. A Regression Model of Recurrent Deep Neural Networks for Noise Robust Estimation of the Fundamental Frequency Contour of Speech

9. Supervector Compression Strategies to Speed up I-Vector System Development

10. Utterance Verification for Text-Dependent Speaker Recognition:A Comparative Assessment Using the RedDots Corpus

11. HAPPY Team Entry to NIST OpenSAD Challenge:A Fusion of Short-Term Unsupervised and Segment i-Vector Based Speech Activity Detectors

12. Robust Speaker Recognition with Combined Use of Acoustic and Throat Microphone Speech

13. Out-of-Set i-Vector Selection for Open-set Language Identification

15. Incorporating uncertainty as a Quality Measure in I-Vector Based Language Recognition

16. Age-Related Voice Disguise and its Impact on Speaker Verification Accuracy

17. Integrated Spoofing Countermeasures and Automatic Speaker Verification:an Evaluation on ASVspoof 2015

18. A comparison of features for synthetic speech detection

19. Introducing i-vectors for joint anti-spoofing and speaker verification

22. Vulnerability evaluation of speaker verification under voice conversion spoofing: the effect of text constraints

23. Exemplar-based unit selection for voice conversion utilizing temporal information

24. Frequency warping and robust speaker verification: a comparison of alternative mel-scale representations

25. Improving monaural speaker identification by double-talk detection

26. What else is new than the hamming window? robust MFCCs for speaker recognition via multitapering

28. Efficient online cohort selection method for speaker verification

29. Real-time speaker identification

Catalog

Books, media, physical & digital resources