Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Non-linear PLDA for i-vector speaker verification., , , , and . INTERSPEECH, page 214-218. ISCA, (2015)STC Speaker Recognition System for the NIST i-Vector Challenge., , and . Odyssey, ISCA, (2014)Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks., , , , and . SPECOM, volume 9319 of Lecture Notes in Computer Science, page 480-486. Springer, (2015)Anti-spoofing Methods for Automatic Speaker Verification System., , and . AIST, volume 661 of Communications in Computer and Information Science, page 172-184. (2016)Text-dependent GMM-JFA system for password based speaker verification., , , and . ICASSP, page 729-733. IEEE, (2014)Audio-Replay Attack Detection Countermeasures., , , , , and . SPECOM, volume 10458 of Lecture Notes in Computer Science, page 171-181. Springer, (2017)A Speaker Recognition System for the SITW Challenge., , , and . INTERSPEECH, page 833-837. ISCA, (2016)On deep speaker embeddings for text-independent speaker recognition., , , , and . Odyssey, page 378-385. ISCA, (2018)Triplet Loss Based Cosine Similarity Metric Learning for Text-independent Speaker Recognition., , , , and . INTERSPEECH, page 2242-2246. ISCA, (2018)STC Antispoofing Systems for the ASVspoof2019 Challenge., , , , , and . CoRR, (2019)