Login / Signup
Speaker Authentication Method using Reservoir Computing for Security System.
Yuki Sakaguchi
Rin Hirakawa
Hideaki Kawano
Yoshihisa Nakatoh
Published in:
ICCE (2022)
Keyphrases
</>
clustering method
similarity measure
significant improvement
neural network
detection method
security issues