Effect of Language Mixture on Speaker Verification: An Investigation with Amharic, English, and Mandarin Chinese

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICAIS (8. : 2022 : Qinghai) Artificial intelligence and security ; Part 3
1. Verfasser: Tadele, Firew (VerfasserIn)
Weitere Verfasser: Wei, Jianguo (VerfasserIn), Honda, Kiyoshi (VerfasserIn), Zhang, Ruiteng (VerfasserIn), Yang, Wenhao (VerfasserIn)
Pages:3
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Deep Learning Network Intrusion Detection Based on Network Traffic 2022 Wang, Hanyang
A Framework for Unknown Traffic Identification Based on Neural Networks and Constraint Information 2022 Kang, Lu
A Method of Data Distribution and Traceability Based on Blockchain 2022 Gu, Bin
Blockchain Cross-Chain Research Based on Verifiable Ring Signatures 2022 Li, Zhe
A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication 2022 Xian, Yongjin
Detect Adversarial Examples by Using Feature Autoencoder 2022 Ye, Hongwei
Behavior Steganography in Social Network via Secret Sharing 2022 Zhu, Xuan
A Survey of Traffic Classification Technology for Smart Home Based on Machine Learning 2022 Chen, Jie
MGDP: Architecture Design of Intelligent Detection Platform for Marine Garbage Based on Intelligent Internet of Things 2022 Cao, Ning
New Generation Power System Security Protection Technology Based on Dynamic Defense 2022 Chen, Xiaowei
Calibration of Multi-dimensional Air Pressure Sensor Based on LSTM 2022 Wang, Tao
Multi-objective Dual-Route Planning Algorithm for Grid Communication Network 2022 Gou, Xiaojun
A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony Strategy 2022 Feng, Xiao
Blockchain-Based Efficient Incentive Mechanism in Crowdsensing 2022 Jiang, Qiulu
An Efficient Certificate-Based Encryption Scheme Without Random Oracles 2022 Guo, Lan
A Rational Hierarchical Quantum State Sharing Protocol 2022 Zhang, Huali
Multi-carrier Steganography Algorithm Based on Executable Program 2022 Tian, Zuwei
Robust Video Watermarking Using Normalized Zernike Moments 2022 Chen, Shiyi
Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic Encryption 2022 Lai, Ruopan
Noise Simulation-Based Deep Optical Watermarking 2022 Wang, Feng
Alle Artikel auflisten