Login / Signup

Speaker Authentication Method using Reservoir Computing for Security System.

Yuki SakaguchiRin HirakawaHideaki KawanoYoshihisa Nakatoh
Published in: ICCE (2022)
Keyphrases
  • clustering method
  • similarity measure
  • significant improvement
  • neural network
  • detection method
  • security issues