Search

Your search keyword '"Lee, Kong Aik"' showing total 413 results

Search Constraints

Start Over You searched for: Author "Lee, Kong Aik" Remove constraint Author: "Lee, Kong Aik"
413 results on '"Lee, Kong Aik"'

Search Results

51. Multi-Level Transfer Learning from Near-Field to Far-Field Speaker Verification

52. Visualizing Classifier Adjacency Relations: A Case Study in Speaker Verification and Voice Anti-Spoofing

53. Exploring Deep Learning for Joint Audio-Visual Lip Biometrics

54. ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech

55. Callsafe – the Vishing Barrier

56. Introduction to Voice Presentation Attack Detection and Recent Advances

57. Using Multi-Resolution Feature Maps with Convolutional Neural Networks for Anti-Spoofing in ASV

58. A Generalized Framework for Domain Adaptation of PLDA in Speaker Recognition

59. Extrapolating false alarm rates in automatic speaker verification

60. Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals

61. Neural i-vectors

62. Short-duration Speaker Verification (SdSV) Challenge 2021: the Challenge Evaluation Plan

63. Speaker detection in the wild: Lessons learned from JSALT 2019

64. Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores

65. ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech

66. Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration

67. I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences

68. ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection

69. Introduction to Voice Presentation Attack Detection and Recent Advances

70. The CORAL+ Algorithm for Unsupervised Domain Adaptation of PLDA

72. Noise-Robust Semi-supervised Multi-modal Machine Translation

74. Attention Mechanism in Speaker Recognition: What Does It Learn in Deep Speaker Embedding?

75. t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

79. Deep Discriminative Embedding with Ranked Weight for Speaker Verification

80. Fantastic 4 system for NIST 2015 Language Recognition Evaluation

82. ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech

88. The Second Multi-Channel Multi-Party Meeting Transcription Challenge (M2MeT 2.0): A Benchmark for Speaker-Attributed ASR

89. Towards Single Integrated Spoofing-aware Speaker Verification Embeddings

99. A Comparison of Categorical Attribute Data Clustering Methods

100. Unifying Probabilistic Linear Discriminant Analysis Variants in Biometric Authentication

Catalog

Books, media, physical & digital resources