The task of speaker change detection (SCD), which detects points where
s...
Our focus lies in developing an online speaker diarisation framework whi...
Speaker embedding extractors significantly influence the performance of
...
The goal of this paper is to train speaker embeddings that are robust to...
The objective of this work is to develop a speaker recognition model to ...
Deep learning has brought impressive progress in the study of both autom...
Speaker verification models that directly operate upon raw waveforms are...
ASV (automatic speaker verification) systems are intrinsically required ...
The objective of this work is to train noise-robust speaker embeddings f...
The objective of this work is effective speaker diarisation using multi-...
Artefacts that differentiate spoofed from bona-fide utterances can resid...
In this work, we present a novel audio-visual dataset for active speaker...
The goal of this paper is to adapt speaker embeddings for solving the pr...
In this work, we propose an overlapped speech detection system trained a...
The objective of this work is speaker diarisation of speech recordings '...
The VoxCeleb Speaker Recognition Challenge (VoxSRC) at Interspeech 2020
...
This work presents a novel back-end framework for speaker verification u...
This report describes our submission to the VoxCeleb Speaker Recognition...
The goal of this work is to train robust speaker recognition models with...
The goal of this work is to synchronise audio and video of a talking fac...
The objective of this paper is 'open-set' speaker recognition of unseen
...
In this study, we analyze the role of various categories of subsidiary
i...
Large datasets are well-known as a key to the recent advances in deep
le...
An adversarial process between two deep neural networks is a promising
a...
Acoustic scene classification identifies an input segment into one of th...
In this study, we concentrate on replacing the process of extracting
han...
Recently, direct modeling of raw waveforms using deep neural networks ha...
In recent years, speaker verification has been primarily performed using...
Input utterance with short duration is one of the most critical threats ...
In this paper, we propose a replay attack spoofing detection system for
...