Login / Signup
Attacks on Speaker Identification Systems Constrained to Speech-to-Text Decoding.
Alireza Farrokh Baroughi
Scott Craver
Daniel Douglas
Published in:
Media Watermarking, Security, and Forensics (2016)
Keyphrases
</>
speaker identification
bayesian networks
gaussian mixture model
probabilistic model
semi supervised