Alert button

"speech recognition": models, code, and papers
Alert button

Practical Speech Recognition with HTK

Aug 06, 2019
Zulkarnaen Hatala

Figure 1 for Practical Speech Recognition with HTK
Figure 2 for Practical Speech Recognition with HTK
Figure 3 for Practical Speech Recognition with HTK
Figure 4 for Practical Speech Recognition with HTK
Viaarxiv icon

Investigation of Densely Connected Convolutional Networks with Domain Adversarial Learning for Noise Robust Speech Recognition

Dec 19, 2021
Chia Yu Li, Ngoc Thang Vu

Figure 1 for Investigation of Densely Connected Convolutional Networks with Domain Adversarial Learning for Noise Robust Speech Recognition
Figure 2 for Investigation of Densely Connected Convolutional Networks with Domain Adversarial Learning for Noise Robust Speech Recognition
Figure 3 for Investigation of Densely Connected Convolutional Networks with Domain Adversarial Learning for Noise Robust Speech Recognition
Figure 4 for Investigation of Densely Connected Convolutional Networks with Domain Adversarial Learning for Noise Robust Speech Recognition
Viaarxiv icon

A Persian ASR-based SER: Modification of Sharif Emotional Speech Database and Investigation of Persian Text Corpora

Nov 18, 2022
Ali Yazdani, Yasser Shekofteh

Figure 1 for A Persian ASR-based SER: Modification of Sharif Emotional Speech Database and Investigation of Persian Text Corpora
Figure 2 for A Persian ASR-based SER: Modification of Sharif Emotional Speech Database and Investigation of Persian Text Corpora
Figure 3 for A Persian ASR-based SER: Modification of Sharif Emotional Speech Database and Investigation of Persian Text Corpora
Figure 4 for A Persian ASR-based SER: Modification of Sharif Emotional Speech Database and Investigation of Persian Text Corpora
Viaarxiv icon

READIN: A Chinese Multi-Task Benchmark with Realistic and Diverse Input Noises

Feb 14, 2023
Chenglei Si, Zhengyan Zhang, Yingfa Chen, Xiaozhi Wang, Zhiyuan Liu, Maosong Sun

Figure 1 for READIN: A Chinese Multi-Task Benchmark with Realistic and Diverse Input Noises
Figure 2 for READIN: A Chinese Multi-Task Benchmark with Realistic and Diverse Input Noises
Figure 3 for READIN: A Chinese Multi-Task Benchmark with Realistic and Diverse Input Noises
Figure 4 for READIN: A Chinese Multi-Task Benchmark with Realistic and Diverse Input Noises
Viaarxiv icon

Conformer-based End-to-end Speech Recognition With Rotary Position Embedding

Jul 13, 2021
Shengqiang Li, Menglong Xu, Xiao-Lei Zhang

Figure 1 for Conformer-based End-to-end Speech Recognition With Rotary Position Embedding
Figure 2 for Conformer-based End-to-end Speech Recognition With Rotary Position Embedding
Figure 3 for Conformer-based End-to-end Speech Recognition With Rotary Position Embedding
Figure 4 for Conformer-based End-to-end Speech Recognition With Rotary Position Embedding
Viaarxiv icon

Pretrained audio neural networks for Speech emotion recognition in Portuguese

Oct 26, 2022
Marcelo Matheus Gauy, Marcelo Finger

Figure 1 for Pretrained audio neural networks for Speech emotion recognition in Portuguese
Figure 2 for Pretrained audio neural networks for Speech emotion recognition in Portuguese
Figure 3 for Pretrained audio neural networks for Speech emotion recognition in Portuguese
Viaarxiv icon

SAN: a robust end-to-end ASR model architecture

Oct 27, 2022
Zeping Min, Qian Ge, Guanhua Huang

Figure 1 for SAN: a robust end-to-end ASR model architecture
Figure 2 for SAN: a robust end-to-end ASR model architecture
Figure 3 for SAN: a robust end-to-end ASR model architecture
Figure 4 for SAN: a robust end-to-end ASR model architecture
Viaarxiv icon

Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data

Feb 13, 2023
Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta

Figure 1 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 2 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 3 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Figure 4 for Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data
Viaarxiv icon

Improving EEG based Continuous Speech Recognition

Dec 24, 2019
Gautam Krishna, Co Tran, Mason Carnahan, Yan Han, Ahmed H Tewfik

Figure 1 for Improving EEG based Continuous Speech Recognition
Figure 2 for Improving EEG based Continuous Speech Recognition
Figure 3 for Improving EEG based Continuous Speech Recognition
Figure 4 for Improving EEG based Continuous Speech Recognition
Viaarxiv icon

Directed Speech Separation for Automatic Speech Recognition of Long Form Conversational Speech

Dec 10, 2021
Rohit Paturi, Sundararajan Srinivasan, Katrin Kirchhoff

Figure 1 for Directed Speech Separation for Automatic Speech Recognition of Long Form Conversational Speech
Figure 2 for Directed Speech Separation for Automatic Speech Recognition of Long Form Conversational Speech
Figure 3 for Directed Speech Separation for Automatic Speech Recognition of Long Form Conversational Speech
Figure 4 for Directed Speech Separation for Automatic Speech Recognition of Long Form Conversational Speech
Viaarxiv icon