Author of the publication

Introducing i-vectors for joint anti-spoofing and speaker verification.

, , , , and . INTERSPEECH, page 61-65. ISCA, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sizov, Aleksandr
add a person with the name Sizov, Aleksandr
 

Other publications of authors with the same name

Spoofing Detection Goes Noisy: An Analysis of Synthetic Speech Detection in the Presence of Additive Noise., , , and . CoRR, (2016)Fantastic 4 system for NIST 2015 Language Recognition Evaluation., , , , , , , , , and 7 other author(s). CoRR, (2016)ASVspoof: The Automatic Speaker Verification Spoofing and Countermeasures Challenge., , , , , , , and . J. Sel. Topics Signal Processing, 11 (4): 588-604 (2017)ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge., , , , , , and . INTERSPEECH, page 2037-2041. ISCA, (2015)Introducing i-vectors for joint anti-spoofing and speaker verification., , , , and . INTERSPEECH, page 61-65. ISCA, (2014)The 2015 NIST Language Recognition Evaluation: The Shared View of I2R, Fantastic4 and SingaMS., , , , , , , , , and 10 other author(s). INTERSPEECH, page 3211-3215. ISCA, (2016)Classifiers for synthetic speech detection: a comparison., , , and . INTERSPEECH, page 2057-2061. ISCA, (2015)Comparison between supervised and unsupervised learning of probabilistic linear discriminant analysis mixture models for speaker verification., and . Pattern Recognition Letters, 34 (11): 1307-1313 (2013)Joint Speaker Verification and Antispoofing in the i-Vector Space., , , , and . IEEE Trans. Information Forensics and Security, 10 (4): 821-832 (2015)Unifying Probabilistic Linear Discriminant Analysis Variants in Biometric Authentication., , and . S+SSPR, volume 8621 of Lecture Notes in Computer Science, page 464-475. Springer, (2014)