default search action
Ville Vestman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j7]Kong Aik Lee, Ville Vestman, Tomi Kinnunen:
ASVtorch toolkit: Speaker verification with deep neural networks. SoftwareX 14: 100697 (2021) - [j6]Andreas Nautsch, Xin Wang, Nicholas W. D. Evans, Tomi H. Kinnunen, Ville Vestman, Massimiliano Todisco, Héctor Delgado, Md. Sahidullah, Junichi Yamagishi, Kong Aik Lee:
ASVspoof 2019: Spoofing Countermeasures for the Detection of Synthesized, Converted and Replayed Speech. IEEE Trans. Biom. Behav. Identity Sci. 3(2): 252-265 (2021) - [c12]Md. Sahidullah, Achintya Kumar Sarkar, Ville Vestman, Xuechen Liu, Romain Serizel, Tomi Kinnunen, Zheng-Hua Tan, Emmanuel Vincent:
UIAI System for Short-Duration Speaker Verification Challenge 2020. SLT 2021: 323-329 - [i14]Andreas Nautsch, Xin Wang, Nicholas W. D. Evans, Tomi Kinnunen, Ville Vestman, Massimiliano Todisco, Héctor Delgado, Md. Sahidullah, Junichi Yamagishi, Kong Aik Lee:
ASVspoof 2019: spoofing countermeasures for the detection of synthesized, converted and replayed speech. CoRR abs/2102.05889 (2021) - 2020
- [j5]Ville Vestman, Tomi Kinnunen, Rosa González Hautamäki, Md. Sahidullah:
Voice Mimicry Attacks Assisted by Automatic Speaker Verification. Comput. Speech Lang. 59: 36-54 (2020) - [j4]Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee:
Voice biometrics security: Extrapolating false alarm rate via hierarchical Bayesian modeling of speaker verification scores. Comput. Speech Lang. 60 (2020) - [j3]Xin Wang, Junichi Yamagishi, Massimiliano Todisco, Héctor Delgado, Andreas Nautsch, Nicholas W. D. Evans, Md. Sahidullah, Ville Vestman, Tomi Kinnunen, Kong Aik Lee, Lauri Juvela, Paavo Alku, Yu-Huai Peng, Hsin-Te Hwang, Yu Tsao, Hsin-Min Wang, Sébastien Le Maguer, Markus Becker, Zhen-Hua Ling:
ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech. Comput. Speech Lang. 64: 101114 (2020) - [j2]Tomi Kinnunen, Héctor Delgado, Nicholas W. D. Evans, Kong Aik Lee, Ville Vestman, Andreas Nautsch, Massimiliano Todisco, Xin Wang, Md. Sahidullah, Junichi Yamagishi, Douglas A. Reynolds:
Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals. IEEE ACM Trans. Audio Speech Lang. Process. 28: 2195-2210 (2020) - [c11]Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee:
Extrapolating False Alarm Rates in Automatic Speaker Verification. INTERSPEECH 2020: 4218-4222 - [c10]Ville Vestman, Kong Aik Lee, Tomi Kinnunen:
Neural i-vectors. Odyssey 2020: 67-74 - [i13]Ville Vestman, Kong Aik Lee, Tomi H. Kinnunen:
Neural i-vectors. CoRR abs/2004.01559 (2020) - [i12]Tomi Kinnunen, Héctor Delgado, Nicholas W. D. Evans, Kong Aik Lee, Ville Vestman, Andreas Nautsch, Massimiliano Todisco, Xin Wang, Md. Sahidullah, Junichi Yamagishi, Douglas A. Reynolds:
Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals. CoRR abs/2007.05979 (2020) - [i11]Md. Sahidullah, Achintya Kumar Sarkar, Ville Vestman, Xuechen Liu, Romain Serizel, Tomi Kinnunen, Zheng-Hua Tan, Emmanuel Vincent:
UIAI System for Short-Duration Speaker Verification Challenge 2020. CoRR abs/2007.13118 (2020) - [i10]Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee:
Extrapolating false alarm rates in automatic speaker verification. CoRR abs/2008.03590 (2020)
2010 – 2019
- 2019
- [c9]Ville Vestman, Bilal Soomro, Anssi Kanervisto, Ville Hautamäki, Tomi Kinnunen:
Who Do I Sound like? Showcasing Speaker Recognition Technology by Youtube Voice Search. ICASSP 2019: 5781-5785 - [c8]Tomi Kinnunen, Rosa González Hautamäki, Ville Vestman, Md. Sahidullah:
Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection. ICASSP 2019: 6146-6150 - [c7]Ville Vestman, Kong Aik Lee, Tomi H. Kinnunen, Takafumi Koshinaka:
Unleashing the Unused Potential of i-Vectors Enabled by GPU Acceleration. INTERSPEECH 2019: 351-355 - [c6]Massimiliano Todisco, Xin Wang, Ville Vestman, Md. Sahidullah, Héctor Delgado, Andreas Nautsch, Junichi Yamagishi, Nicholas W. D. Evans, Tomi H. Kinnunen, Kong Aik Lee:
ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection. INTERSPEECH 2019: 1008-1012 - [c5]Kong Aik Lee, Ville Hautamäki, Tomi H. Kinnunen, Hitoshi Yamamoto, Koji Okabe, Ville Vestman, Jing Huang, Guohong Ding, Hanwu Sun, Anthony Larcher, Rohan Kumar Das, Haizhou Li, Mickael Rouvier, Pierre-Michel Bousquet, Wei Rao, Qing Wang, Chunlei Zhang, Fahimeh Bahmaninezhad, Héctor Delgado, Massimiliano Todisco:
I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences. INTERSPEECH 2019: 1497-1501 - [i9]Massimiliano Todisco, Xin Wang, Ville Vestman, Md. Sahidullah, Héctor Delgado, Andreas Nautsch, Junichi Yamagishi, Nicholas W. D. Evans, Tomi Kinnunen, Kong Aik Lee:
ASVspoof 2019: Future Horizons in Spoofed and Fake Audio Detection. CoRR abs/1904.05441 (2019) - [i8]Kong Aik Lee, Ville Hautamäki, Tomi Kinnunen, Hitoshi Yamamoto, Koji Okabe, Ville Vestman, Jing Huang, Guohong Ding, Hanwu Sun, Anthony Larcher, Rohan Kumar Das, Haizhou Li, Mickael Rouvier, Pierre-Michel Bousquet, Wei Rao, Qing Wang, Chunlei Zhang, Fahimeh Bahmaninezhad, Héctor Delgado, Jose Patino, Qiongqiong Wang, Ling Guo, Takafumi Koshinaka, Jiacen Zhang, Koichi Shinoda, Trung Ngo Trong, Md. Sahidullah, Fan Lu, Yun Tang, Ming Tu, Kah Kuan Teh, Tran Huy Dat, Kuruvachan K. George, Ivan Kukanov, Florent Desnous, Jichen Yang, Emre Yilmaz, Longting Xu, Jean-François Bonastre, Chenglin Xu, Zhi Hao Lim, Eng Siong Chng, Shivesh Ranjan, John H. L. Hansen, Massimiliano Todisco, Nicholas W. D. Evans:
I4U Submission to NIST SRE 2018: Leveraging from a Decade of Shared Experiences. CoRR abs/1904.07386 (2019) - [i7]Ville Vestman, Tomi Kinnunen, Rosa González Hautamäki, Md. Sahidullah:
Voice Mimicry Attacks Assisted by Automatic Speaker Verification. CoRR abs/1906.01454 (2019) - [i6]Ville Vestman, Kong Aik Lee, Tomi H. Kinnunen, Takafumi Koshinaka:
Unleashing the Unused Potential of I-Vectors Enabled by GPU Acceleration. CoRR abs/1906.08556 (2019) - [i5]Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee:
Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores. CoRR abs/1911.01182 (2019) - [i4]Xin Wang, Junichi Yamagishi, Massimiliano Todisco, Héctor Delgado, Andreas Nautsch, Nicholas W. D. Evans, Md. Sahidullah, Ville Vestman, Tomi Kinnunen, Kong Aik Lee, Lauri Juvela, Paavo Alku, Yu-Huai Peng, Hsin-Te Hwang, Yu Tsao, Hsin-Min Wang, Sébastien Le Maguer, Markus Becker, Fergus Henderson, Rob Clark, Yu Zhang, Quan Wang, Ye Jia, Kai Onuma, Koji Mushika, Takashi Kaneda, Yuan Jiang, Li-Juan Liu, Yi-Chiao Wu, Wen-Chin Huang, Tomoki Toda, Kou Tanaka, Hirokazu Kameoka, Ingmar Steiner, Driss Matrouf, Jean-François Bonastre, Avashna Govender, Srikanth Ronanki, Jing-Xuan Zhang, Zhen-Hua Ling:
The ASVspoof 2019 database. CoRR abs/1911.01601 (2019) - 2018
- [j1]Ville Vestman, Dhananjaya N. Gowda, Md. Sahidullah, Paavo Alku, Tomi Kinnunen:
Speaker recognition from whispered speech: A tutorial survey and an application of time-varying linear prediction. Speech Commun. 99: 62-79 (2018) - [c4]Ville Vestman, Tomi Kinnunen:
Supervector Compression Strategies to Speed up I-Vector System Development. Odyssey 2018: 357-364 - [i3]Ville Vestman, Tomi Kinnunen:
Supervector Compression Strategies to Speed up I-Vector System Development. CoRR abs/1805.01156 (2018) - [i2]Ville Vestman, Bilal Soomro, Anssi Kanervisto, Ville Hautamäki, Tomi Kinnunen:
Who Do I Sound Like? Showcasing Speaker Recognition Technology by YouTube Voice Search. CoRR abs/1811.03293 (2018) - [i1]Tomi Kinnunen, Rosa González Hautamäki, Ville Vestman, Md. Sahidullah:
Can We Use Speaker Recognition Technology to Attack Itself? Enhancing Mimicry Attacks Using Automatic Target Speaker Selection. CoRR abs/1811.03790 (2018) - 2017
- [c3]Anssi Kanervisto, Ville Vestman, Md. Sahidullah, Ville Hautamäki, Tomi Kinnunen:
Effects of gender information in text-independent and text-dependent speaker verification. ICASSP 2017: 5360-5364 - [c2]Kong-Aik Lee, Ville Hautamäki, Tomi Kinnunen, Anthony Larcher, Chunlei Zhang, Andreas Nautsch, Themos Stafylakis, Gang Liu, Mickaël Rouvier, Wei Rao, Federico Alegre, J. Ma, Man-Wai Mak, Achintya Kumar Sarkar, Héctor Delgado, Rahim Saeidi, Hagai Aronowitz, Aleksandr Sizov, Hanwu Sun, Trung Hieu Nguyen, Guangsen Wang, Bin Ma, Ville Vestman, Md. Sahidullah, M. Halonen, Anssi Kanervisto, Gaël Le Lan, Fahimeh Bahmaninezhad, Sergey Isadskiy, Christian Rathgeb, Christoph Busch, Georgios Tzimiropoulos, Q. Qian, Z. Wang, Q. Zhao, T. Wang, H. Li, J. Xue, S. Zhu, R. Jin, T. Zhao, Pierre-Michel Bousquet, Moez Ajili, Waad Ben Kheder, Driss Matrouf, Zhi Hao Lim, Chenglin Xu, Haihua Xu, Xiong Xiao, Eng Siong Chng, Benoit G. B. Fauve, Kaavya Sriskandaraja, Vidhyasaharan Sethu, W. W. Lin, Dennis Alexander Lehmann Thomsen, Zheng-Hua Tan, Massimiliano Todisco, Nicholas W. D. Evans, Haizhou Li, John H. L. Hansen, Jean-François Bonastre, Eliathamby Ambikairajah:
The I4U Mega Fusion and Collaboration for NIST Speaker Recognition Evaluation 2016. INTERSPEECH 2017: 1328-1332 - [c1]Ville Vestman, Dhananjaya N. Gowda, Md. Sahidullah, Paavo Alku, Tomi Kinnunen:
Time-Varying Autoregressions for Speaker Verification in Reverberant Conditions. INTERSPEECH 2017: 1512-1516
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-22 19:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint