Suchergebnisse
UB Katalog
Artikel & mehr
Suchmaske
Meinten Sie men?
Suchergebnisse einschränken oder erweitern
Aktive Suchfilter
Weniger Treffer
Gefunden in
Art der Quelle
Schlagwort
- mel frequency cepstral coefficient 12 Treffer
- feature extraction 11 Treffer
- speech recognition 6 Treffer
- speech 5 Treffer
- cepstral analysis 3 Treffer
-
45 weitere Werte:
- distortion measurement 3 Treffer
- microphones 3 Treffer
- speaker recognition 3 Treffer
- support vector machines 3 Treffer
- audio forensics 2 Treffer
- audio recording 2 Treffer
- databases 2 Treffer
- discrete cosine transforms 2 Treffer
- filter banks 2 Treffer
- fingerprint recognition 2 Treffer
- forensics 2 Treffer
- mobile handsets 2 Treffer
- neural networks 2 Treffer
- noise 2 Treffer
- noise measurement 2 Treffer
- speech synthesis 2 Treffer
- synthetic speech detection 2 Treffer
- time-frequency analysis 2 Treffer
- training 2 Treffer
- 1-d cnn 1 Treffer
- acoustic reverberation 1 Treffer
- adaboost 1 Treffer
- adversarial example 1 Treffer
- anti-spoofing 1 Treffer
- art 1 Treffer
- audio 1 Treffer
- audio databases 1 Treffer
- audio fingerprinting 1 Treffer
- audio surveillance 1 Treffer
- background noise 1 Treffer
- bandwidth 1 Treffer
- binary features 1 Treffer
- black-box attacks 1 Treffer
- cloning 1 Treffer
- closed box 1 Treffer
- cochleagram 1 Treffer
- computational efficiency 1 Treffer
- computational modeling 1 Treffer
- computer science 1 Treffer
- correlation 1 Treffer
- countermeasures 1 Treffer
- deep learning 1 Treffer
- deep neural network (dnn) 1 Treffer
- deep representation 1 Treffer
- detectors 1 Treffer
16 Treffer
-
In: IEEE Transactions on Information Forensics and Security, Jg. 4 (2009-09-01), Heft 3, S. 359-368Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 18 (2023), S. 3647-3661Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 15 (2020), S. 2160-2170Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 15 (2020), S. 1616-1629Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 16 (2021), S. 3524-3537Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 15 (2020), S. 526-538Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 14 (2019-11-01), Heft 11, S. 2875-2886Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 7 (2012-04-01), Heft 2, S. 625-634Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 9 (2014-03-01), Heft 3, S. 489-500Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 13 (2018-09-01), Heft 9, S. 2179-2179Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 7 (2012-02-01), Heft 1, S. 241-254Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 13 (2018-04-01), Heft 4, S. 965-965Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 10 (2015-04-01), Heft 4, S. 810-810Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 8 (2013-11-01), Heft 11, S. 1746-1759Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 1 (2006-12-01), Heft 4, S. 457-463Online academicJournalZugriff:
-
In: IEEE Transactions on Information Forensics and Security, Jg. 10 (2015-12-01), Heft 12, S. 2605-2605Online academicJournalZugriff: