Kong Aik Lee
Kong Aik Lee
Institute for Infocomm Research, A*STAR, Singapore
Verified email at - Homepage
Cited by
Cited by
Improving convergence of the NLMS algorithm using constrained subband updates
KA Lee, WS Gan
IEEE signal processing letters 11 (9), 736-739, 2004
Subband adaptive filtering: theory and implementation
KA Lee, WS Gan, SM Kuo
John Wiley & Sons, 2009
The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection
T Kinnunen, M Sahidullah, H Delgado, M Todisco, N Evans, J Yamagishi, ...
ISCA (the International Speech Communication Association), 2017
Text-dependent speaker verification: Classifiers, databases and RSR2015
A Larcher, KA Lee, B Ma, H Li
Speech Communication 60, 56-77, 2014
Spoken language recognition: from fundamentals to practice
H Li, B Ma, KA Lee
Proceedings of the IEEE 101 (5), 1136-1159, 2013
ASVspoof 2019: Future horizons in spoofed and fake audio detection
M Todisco, X Wang, V Vestman, M Sahidullah, H Delgado, A Nautsch, ...
arXiv preprint arXiv:1904.05441, 2019
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
T Kinnunen, ZZ Wu, KA Lee, F Sedlak, ES Chng, H Li
2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012
The RedDots data collection for speaker recognition
KA Lee, A Larcher, G Wang, P Kenny, N Brümmer, D Van Leeuwen, ...
Interspeech 2015, 2015
ALIZE 3.0-open source toolkit for state-of-the-art speaker recognition
A Larcher, JF Bonastre, B Fauve, KA Lee, C Lévy, H Li, J Mason, ...
Annual Conference of the International Speech Communication Association, 2013
Low-variance multitaper MFCC features: a case study in robust speaker verification
T Kinnunen, R Saeidi, F Sedlák, KA Lee, J Sandberg, ...
IEEE transactions on audio, speech, and language processing 20 (7), 1990-2001, 2012
ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements
H Delgado, M Todisco, M Sahidullah, N Evans, T Kinnunen, KA Lee, ...
Odyssey 2018-The Speaker and Language Recognition Workshop, 2018
Reddots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research
T Kinnunen, M Sahidullah, M Falcone, L Costantini, RG Hautamäki, ...
2017 IEEE International conference on acoustics, speech and signal …, 2017
An SVM kernel with GMM-supervector based on the Bhattacharyya distance for speaker recognition
CH You, KA Lee, H Li
IEEE Signal processing letters 16 (1), 49-52, 2008
GMM-SVM kernel with a Bhattacharyya-based distance for speaker recognition
CH You, KA Lee, H Li
IEEE Transactions on Audio, Speech, and Language Processing 18 (6), 1300-1312, 2009
The RSR2015: Database for text-dependent speaker verification using multiple pass-phrases
A Larcher, KA Lee, B Ma, H Li
Annual Conference of the International Speech Communication Association …, 2012
Inherent decorrelating and least perturbation properties of the normalized subband adaptive filter
KA Lee, WS Gan
IEEE Transactions on Signal Processing 54 (11), 4475-4480, 2006
t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification
T Kinnunen, KA Lee, H Delgado, N Evans, M Todisco, M Sahidullah, ...
arXiv preprint arXiv:1804.09618, 2018
I4U submission to NIST SRE 2012: A large-scale collaborative effort for noise-robust speaker verification
R Saedi, KA Lee, T Kinnunen, T Hasan, B Fauve, PM Bousquet, E Khoury, ...
Interspeech, 2013
ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech
X Wang, J Yamagishi, M Todisco, H Delgado, A Nautsch, N Evans, ...
Computer Speech & Language 64, 101114, 2020
I-vectors in the context of phonetically-constrained short utterances for speaker verification
A Larcher, PM Bousquet, KA Lee, D Matrouf, H Li, JF Bonastre
2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20