共 50 条
- [1] Practical Adversarial Attacks Against Speaker Recognition Systems PROCEEDINGS OF THE 21ST INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE'20), 2020, : 9 - 14
- [2] Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the Case of Telephone Speech 2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 4401 - 4404
- [3] Representation Learning to Classify and Detect Adversarial Attacks against Speaker and Speech Recognition Systems INTERSPEECH 2021, 2021, : 4304 - 4308
- [4] Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems 2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 692 - 699
- [6] Speaker Independent Sinhala Speech Recognition for Voice Dialling INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER2012), 2012, : 3 - 6
- [7] Fuzzy hidden Markov models for speech and speaker recognition 18TH INTERNATIONAL CONFERENCE OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY - NAFIPS, 1999, : 426 - 430
- [8] Fuzzy hidden Markov models for speech and speaker recognition Annual Conference of the North American Fuzzy Information Processing Society - NAFIPS, 1999, : 426 - 430
- [9] Speaker Authentication System Based on Voice Biometrics and Speech Recognition BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2016, 2017, 263 : 79 - 84
- [10] Speaker clustering and transformation for speaker adaptation in speech recognition systems IEEE TRANSACTIONS ON SPEECH AND AUDIO PROCESSING, 1998, 6 (01): : 71 - 77