Some of the experiments presented in this manuscript were performed on Grid5000, a server supported by a scientific interest group of Inria, CNRS, RENATER, and other universities and organizations (see https://www.grid5000). Other experiments were carried out on the EXPLOR server at the University of Lorraine.Smart applications like speaker verification have become essential in verifying the user’s identity for availing of personal assistants or online banking services based on the user’s voice characteristics. However, far-field or distant speaker verification is constantly affected by surrounding noises which can severely distort the speech signal. Moreover, speech signals propagating in long-range get reflected by various objects in the ...
Un grand nombre d’appareils que nous utilisons au quotidien embarque un ou plusieurs microphones afi...
Automatic speaker verification has many potential applications in security, surveillance and access ...
Automatic speaker verification has many potential applications in security, surveillance and access ...
Some of the experiments presented in this manuscript were performed on Grid5000, a server supported ...
Les applications telles que la vérification du locuteur sont devenues essentielles pour vérifier l'i...
International audienceToday's smart devices using speaker verification are getting equipped with mul...
Proceedings of Interspeech 2023International audienceThe paper introduces Diff-Filter, a multichanne...
Cette thèse s'insère dans le développement des systèmes de télécommunication mains-libres, en partic...
International audienceSpeaker verification (SV) suffers from unsatisfactory performance in far-field...
This PhD falls within the development of hands-free telecommunication systems, more specifically sma...
In this work we improve the performance of a speaker verification system by matching the feature vec...
International audienceSpeech signals can be corrupted by environmental noise as well as room reverbe...
In this paper, a novel architecture for speaker recognition is proposed by cascading speech enhancem...
In this paper, we address the problem of speaker verification in conditions unseen or unknown during...
Identity verification or biometric recognition systems play an important role in our dailylives. App...
Un grand nombre d’appareils que nous utilisons au quotidien embarque un ou plusieurs microphones afi...
Automatic speaker verification has many potential applications in security, surveillance and access ...
Automatic speaker verification has many potential applications in security, surveillance and access ...
Some of the experiments presented in this manuscript were performed on Grid5000, a server supported ...
Les applications telles que la vérification du locuteur sont devenues essentielles pour vérifier l'i...
International audienceToday's smart devices using speaker verification are getting equipped with mul...
Proceedings of Interspeech 2023International audienceThe paper introduces Diff-Filter, a multichanne...
Cette thèse s'insère dans le développement des systèmes de télécommunication mains-libres, en partic...
International audienceSpeaker verification (SV) suffers from unsatisfactory performance in far-field...
This PhD falls within the development of hands-free telecommunication systems, more specifically sma...
In this work we improve the performance of a speaker verification system by matching the feature vec...
International audienceSpeech signals can be corrupted by environmental noise as well as room reverbe...
In this paper, a novel architecture for speaker recognition is proposed by cascading speech enhancem...
In this paper, we address the problem of speaker verification in conditions unseen or unknown during...
Identity verification or biometric recognition systems play an important role in our dailylives. App...
Un grand nombre d’appareils que nous utilisons au quotidien embarque un ou plusieurs microphones afi...
Automatic speaker verification has many potential applications in security, surveillance and access ...
Automatic speaker verification has many potential applications in security, surveillance and access ...