Vadim Shchemelinin

According to our database1, Vadim Shchemelinin authored at least 13 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
On deep speaker embeddings for text-independent speaker recognition.
Proceedings of the Odyssey 2018: The Speaker and Language Recognition Workshop, 2018

Triplet Loss Based Cosine Similarity Metric Learning for Text-independent Speaker Recognition.
Proceedings of the Interspeech 2018, 2018

Deep CNN Based Feature Extractor for Text-Prompted Speaker Recognition.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2017
Audio-Replay Attack Detection Countermeasures.
Proceedings of the Speech and Computer - 19th International Conference, 2017

Audio Replay Attack Detection with Deep Learning Frameworks.
Proceedings of the Interspeech 2017, 2017

2016
Improving the Quality of Automatic Speech Recognition in Trucks.
Proceedings of the Speech and Computer - 18th International Conference, 2016

STC anti-spoofing systems for the ASVspoof 2015 challenge.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Vulnerability of Voice Verification System with STC Anti-spoofing Detector to Different Methods of Spoofing Attacks.
Proceedings of the Speech and Computer - 17th International Conference, 2015

Automatically Trained TTS for Effective Attacks to Anti-spoofing System.
Proceedings of the Speech and Computer - 17th International Conference, 2015

2014
Vulnerability of Voice Verification Systems to Spoofing Attacks by TTS Voices Based on Automatically Labeled Telephone Speech.
Proceedings of the Speech and Computer - 16th International Conference, 2014

"STC spoofing" database for text-dependent speaker recognition evaluation.
Proceedings of the 4th Workshop on Spoken Language Technologies for Under-resourced Languages, 2014

Voice Passphrase Variability Evaluation for Speaker Recognition.
Proceedings of the Computational Forensics, 2014

2013
Examining Vulnerability of Voice Verification Systems to Spoofing Attacks by Means of a TTS System.
Proceedings of the Speech and Computer - 15th International Conference, 2013


  Loading...