Abstract: Automatic Speaker Verification systems are prone to various voice spoofing attacks such as replays, voice conversion (VC) and speech synthesis. Malicious users can perform specific tasks ...
Abstract: Network signal control is an effective way to mitigate traffic congestion. However, most network signal control methods ignore the risk of queue spillback. Although local and decentralized ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results