共 48 条
[1]
[Anonymous], 2016, 2016 IEEE 8 INT C BI
[2]
Brummer N., 2010, P OD 2010 BRNO CZECH
[3]
Bruna J., 2014, INT C LEARN REPR
[4]
Anti-spoofing in action: joint operation with a verification system
[J].
2013 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW),
2013,
:98-104
[5]
Evaluation of Speaker Verification Security and Detection of HMM-Based Synthetic Speech
[J].
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING,
2012, 20 (08)
:2280-2290
[6]
MAXIMUM LIKELIHOOD FROM INCOMPLETE DATA VIA EM ALGORITHM
[J].
JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES B-METHODOLOGICAL,
1977, 39 (01)
:1-38
[7]
Deng YP, 2020, IEEE IMAGE PROC, P1241, DOI [10.1109/ICIP40778.2020.9191288, 10.1109/icip40778.2020.9191288]
[9]
Gomez-Alanis A., 2018, P IBERSPEECH 2018, P45
[10]
Gomez-Alanis A., 2021, P IBERSPEECH 2021, P255