Search
Now showing items 271-280 of 359
A complex adaptive system of systems approach to human–automation interaction in smart grid
(Wiley, 2015)
This chapter expresses three cognitive genres: descriptive genre, normative/prescriptive genre, and know-how genre. The descriptive genre introduces and discusses on the following disciplines: the core concepts of complexity, ...
Anti-spoofing for text-independent speaker verification: An initial database, comparison of countermeasures, and human performance
(IEEE, 2016-04)
In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis ...
Modeling the development of infant imitation using inverse reinforcement learning
(IEEE, 2018-09)
Little is known about the computational mechanisms of how imitation skills develop along with infant sensorimotor learning. In robotics, there are several well developed frameworks for imitation learning or so called ...
Performance of the OZU speaker verification systems with the NIST SRE 2010 data in a multi-class scenario
(IEEE, 2012)
Konuşmacı doğrulama sistemlerinin başarımı tipik olarak ikili karar mekanizmasına dayanır. Yine de finans şirketlerinin çağrı merkezi gibi 100%’ e yakın kesinlik gerektiren uygulamalarda var olan sistemlerin ikili kararlarına ...
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)
Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ...
Policy conflict resolution in IoT via planning
(Advances in Artificial Intelligence, 2017)
With the explosion of connected devices to automate tasks, manually governing interactions among such devices—and associated services—has become an impossible task. This is because devices have their own obligations and ...
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)
State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ...
High-performance complex event processing using continuous sliding views
(ACM, 2013)
Complex Event Processing (CEP) has become increasingly important for tracking and monitoring anomalies and trends in event streams emitted from business processes such as supply chain management to online stores in e-commerce. ...
Game of protocols: Is QUIC ready for prime time streaming?
(Wiley, 2020-05)
Quick User Datagram Protocol (UDP) Internet Connections (QUIC) is an experimental and low-latency transport protocol proposed by Google, which is still being improved and specified in the Internet Engineering Task Force ...
Automatic fall detection for elderly by using features extracted from skeletal data
(IEEE, 2013)
Automatic detection of unusual events such as falls is very important especially for elderly people living alone. Realtime detection of these events can reduce the health risks associated with a fall. In this paper, we ...
Share this page