A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
On The Vulnerability Of Automatic Speaker Recognition To Spoofing Attacks With Artificial Signals
2012
Zenodo
Publication in the conference proceedings of EUSIPCO, Bucharest, Romania, 2012
doi:10.5281/zenodo.52151
fatcat:q3knfof3vbeuxowdqamwuo4da4