Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech,” (2012)

by T Kinnunen, Z Z Wu, K A Lee, F Sedlak, E S Chng, H Li
Venue:in Acoustics, Speech and Signal Processing (ICASSP), 2012 IEEE International Conference on. IEEE,