First Page | Document Content | |
---|---|---|
Date: 2015-09-29 11:06:25Computer network security Security Cyberwarfare Finance Spoofing attack Spoofing Spoof Computer security Speech synthesis Biometrics Robust random early detection Speech technology | ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1Add to Reading ListSource URL: www.cstr.inf.ed.ac.ukDownload Document from Source WebsiteFile Size: 128,16 KBShare Document on Facebook |