Login / Signup

Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech.

Tomi KinnunenZhizheng WuKong-Aik LeeFilip SedlakEngsiong ChngHaizhou Li
Published in: ICASSP (2012)
Keyphrases