Kong Aik Lee
Kong Aik Lee
The Hong Kong Polytechnic University, Hong Kong
Verified email at - Homepage
Cited by
Cited by
ASVspoof 2019: Future horizons in spoofed and fake audio detection
M Todisco, X Wang, V Vestman, M Sahidullah, H Delgado, A Nautsch, ...
arXiv preprint arXiv:1904.05441, 2019
The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection
T Kinnunen, M Sahidullah, H Delgado, M Todisco, N Evans, J Yamagishi, ...
Interspeech 2017, 2-6, 2017
Subband adaptive filtering: theory and implementation
KA Lee, WS Gan, SM Kuo
John Wiley & Sons, 2009
Improving convergence of the NLMS algorithm using constrained subband updates
KA Lee, WS Gan
IEEE signal processing letters 11 (9), 736-739, 2004
Spoken language recognition: from fundamentals to practice
H Li, B Ma, KA Lee
Proceedings of the IEEE 101 (5), 1136-1159, 2013
Text-dependent speaker verification: Classifiers, databases and RSR2015
A Larcher, KA Lee, B Ma, H Li
Speech Communication 60, 56-77, 2014
ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech
X Wang, J Yamagishi, M Todisco, H Delgado, A Nautsch, N Evans, ...
Computer Speech & Language 64, 101114, 2020
ASVspoof 2021: accelerating progress in spoofed and deepfake speech detection
J Yamagishi, X Wang, M Todisco, M Sahidullah, J Patino, A Nautsch, ...
ASVspoof 2021 Workshop-Automatic Speaker Verification and Spoofing …, 2021
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
T Kinnunen, ZZ Wu, KA Lee, F Sedlak, ES Chng, H Li
2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012
ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements
H Delgado, M Todisco, M Sahidullah, N Evans, T Kinnunen, KA Lee, ...
The Speaker and Language Recognition Workshop, 296-303, 2018
The RedDots data collection for speaker recognition
KA Lee, A Larcher, G Wang, P Kenny, N Brümmer, D Van Leeuwen, ...
Interspeech 2015, 2015
Low-variance multitaper MFCC features: A case study in robust speaker verification
T Kinnunen, R Saeidi, F Sedlák, KA Lee, J Sandberg, ...
IEEE transactions on audio, speech, and language processing 20 (7), 1990-2001, 2012
t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification
T Kinnunen, KA Lee, H Delgado, N Evans, M Todisco, M Sahidullah, ...
arXiv preprint arXiv:1804.09618, 2018
ALIZE 3.0-open source toolkit for state-of-the-art speaker recognition
A Larcher, JF Bonastre, B Fauve, KA Lee, C Lévy, H Li, J Mason, ...
Annual Conference of the International Speech Communication Association, 2013
ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech
A Nautsch, X Wang, N Evans, TH Kinnunen, V Vestman, M Todisco, ...
IEEE Transactions on Biometrics, Behavior, and Identity Science 3 (2), 252-265, 2021
Reddots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research
T Kinnunen, M Sahidullah, M Falcone, L Costantini, RG Hautamäki, ...
2017 IEEE International conference on acoustics, speech and signal …, 2017
An SVM kernel with GMM-supervector based on the Bhattacharyya distance for speaker recognition
CH You, KA Lee, H Li
IEEE Signal processing letters 16 (1), 49-52, 2008
The RSR2015: Database for text-dependent speaker verification using multiple pass-phrases
A Larcher, KA Lee, B Ma, H Li
Annual Conference of the International Speech Communication Association …, 2012
GMM-SVM kernel with a Bhattacharyya-based distance for speaker recognition
CH You, KA Lee, H Li
IEEE Transactions on Audio, Speech, and Language Processing 18 (6), 1300-1312, 2009
Asvspoof 2021: Towards spoofed and deepfake speech detection in the wild
X Liu, X Wang, M Sahidullah, J Patino, H Delgado, T Kinnunen, ...
IEEE/ACM Transactions on Audio, Speech, and Language Processing 31, 2507-2522, 2023
The system can't perform the operation now. Try again later.
Articles 1–20