-
1
-
-
0032664931
-
An experimental study of speaker verification sensitivity to computer voice-altered imposters
-
B.L. Pellom and J.H.L. Hansen, "An experimental study of speaker verification sensitivity to computer voice-altered imposters," in ICASSP, 1999.
-
(1999)
ICASSP
-
-
Pellom, B.L.1
Hansen, J.H.L.2
-
2
-
-
33947623206
-
Text-independent voice conversion based on unit selection
-
David Sundermann, Harald Hoge, Antonio Bonaforte, Hermann Ney, Alan Black, and Shri Narayanan, "Text-independent voice conversion based on unit selection," in ICASSP, 2006.
-
(2006)
ICASSP
-
-
Sundermann, D.1
Hoge, H.2
Bonaforte, A.3
Ney, H.4
Black, A.5
Narayanan, S.6
-
3
-
-
0020312165
-
Protocols for secure computations
-
Andrew Yao, "Protocols for secure computations," in FOCS, 1982.
-
(1982)
FOCS
-
-
Yao, A.1
-
4
-
-
50249135964
-
A framework for secure speech recognition
-
Paris Smaragdis and Madhusudana Shashanka, "A framework for secure speech recognition," IEEE Trans. on Audio, Speech & Language Processing, vol. 15, no. 4, pp. 1404-1413, 2007.
-
(2007)
IEEE Trans. on Audio, Speech & Language Processing
, vol.15
, Issue.4
, pp. 1404-1413
-
-
Smaragdis, P.1
Shashanka, M.2
-
5
-
-
80051624586
-
Privacy preserving probabilistic inference with hidden Markov models
-
Manas Pathak, Shantanu Rane, Wei Sun, and Bhiksha Raj, "Privacy preserving probabilistic inference with hidden Markov models," in ICASSP, 2011.
-
(2011)
ICASSP
-
-
Pathak, M.1
Rane, S.2
Sun, W.3
Raj, B.4
-
6
-
-
2942594475
-
A tutorial on text-independent speaker verification
-
Frederic Bimbot et. al., "A tutorial on text-independent speaker verification," EURASIP Journal on Applied Signal Processing, vol. 4, pp. 430-451, 2004.
-
(2004)
EURASIP Journal on Applied Signal Processing
, vol.4
, pp. 430-451
-
-
Bimbot, F.1
-
7
-
-
0028996937
-
Testing with the YOHO CD-ROM voice verification corpus
-
Joseph P. Campbell, "Testing with the YOHO CD-ROM voice verification corpus," in ICASSP, 1995, pp. 341-344.
-
(1995)
ICASSP
, pp. 341-344
-
-
Campbell, J.P.1
-
8
-
-
85075924869
-
Comparison of background normalization methods for text-independent speaker verification
-
Douglas A. Reynolds, "Comparison of background normalization methods for text-independent speaker verification," in Eurospeech, 1997, vol. 2, pp. 963-966.
-
(1997)
Eurospeech
, vol.2
, pp. 963-966
-
-
Reynolds, D.A.1
-
9
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Pascal Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999.
-
(1999)
EUROCRYPT
-
-
Paillier, P.1
-
10
-
-
84885886133
-
-
"Appendix," http://mlsp.cs.cmu.edu/publications/pdfs/ppsv.pdf.
-
Appendix
-
-
-
11
-
-
84865786575
-
-
"Openssl," http://www.openssl.org/docs/crypto/bn.html.
-
Openssl
-
-
-
12
-
-
85086419359
-
Privacy-preserving data mining in the malicious model
-
Murat Kantarcioglu and Onur Kardes, "Privacy-preserving data mining in the malicious model," J. Information and Computer Security, vol. 2, no. 4, pp. 353-375, 2008.
-
(2008)
J. Information and Computer Security
, vol.2
, Issue.4
, pp. 353-375
-
-
Kantarcioglu, M.1
Kardes, O.2
|