Alert button
Picture for Alexey Sholokhov

Alexey Sholokhov

Alert button

Probabilistic Back-ends for Online Speaker Recognition and Clustering

Add code
Bookmark button
Alert button
Feb 19, 2023
Alexey Sholokhov, Nikita Kuzmin, Kong Aik Lee, Eng Siong Chng

Figure 1 for Probabilistic Back-ends for Online Speaker Recognition and Clustering
Figure 2 for Probabilistic Back-ends for Online Speaker Recognition and Clustering
Figure 3 for Probabilistic Back-ends for Online Speaker Recognition and Clustering
Figure 4 for Probabilistic Back-ends for Online Speaker Recognition and Clustering
Viaarxiv icon

Baselines and Protocols for Household Speaker Recognition

Add code
Bookmark button
Alert button
May 05, 2022
Alexey Sholokhov, Xuechen Liu, Md Sahidullah, Tomi Kinnunen

Figure 1 for Baselines and Protocols for Household Speaker Recognition
Figure 2 for Baselines and Protocols for Household Speaker Recognition
Figure 3 for Baselines and Protocols for Household Speaker Recognition
Figure 4 for Baselines and Protocols for Household Speaker Recognition
Viaarxiv icon

Magnitude-aware Probabilistic Speaker Embeddings

Add code
Bookmark button
Alert button
Feb 28, 2022
Nikita Kuzmin, Igor Fedorov, Alexey Sholokhov

Figure 1 for Magnitude-aware Probabilistic Speaker Embeddings
Figure 2 for Magnitude-aware Probabilistic Speaker Embeddings
Figure 3 for Magnitude-aware Probabilistic Speaker Embeddings
Figure 4 for Magnitude-aware Probabilistic Speaker Embeddings
Viaarxiv icon

Extrapolating false alarm rates in automatic speaker verification

Add code
Bookmark button
Alert button
Aug 08, 2020
Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee

Figure 1 for Extrapolating false alarm rates in automatic speaker verification
Figure 2 for Extrapolating false alarm rates in automatic speaker verification
Viaarxiv icon

Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores

Add code
Bookmark button
Alert button
Nov 04, 2019
Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee

Figure 1 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 2 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 3 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Figure 4 for Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores
Viaarxiv icon