Follow
Kong Aik Lee
Kong Aik Lee
Institute for Infocomm Research, A*STAR, Singapore
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection
T Kinnunen, M Sahidullah, H Delgado, M Todisco, N Evans, J Yamagishi, ...
ISCA (the International Speech Communication Association), 2017
3822017
ASVspoof 2019: Future horizons in spoofed and fake audio detection
M Todisco, X Wang, V Vestman, M Sahidullah, H Delgado, A Nautsch, ...
arXiv preprint arXiv:1904.05441, 2019
3742019
Improving convergence of the NLMS algorithm using constrained subband updates
KA Lee, WS Gan
IEEE signal processing letters 11 (9), 736-739, 2004
3512004
Subband adaptive filtering: theory and implementation
KA Lee, WS Gan, SM Kuo
John Wiley & Sons, 2009
3442009
Text-dependent speaker verification: Classifiers, databases and RSR2015
A Larcher, KA Lee, B Ma, H Li
Speech Communication 60, 56-77, 2014
3212014
Spoken language recognition: from fundamentals to practice
H Li, B Ma, KA Lee
Proceedings of the IEEE 101 (5), 1136-1159, 2013
3162013
Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech
T Kinnunen, ZZ Wu, KA Lee, F Sedlak, ES Chng, H Li
2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012
2072012
The RedDots data collection for speaker recognition
KA Lee, A Larcher, G Wang, P Kenny, N Brümmer, D Van Leeuwen, ...
Interspeech 2015, 2015
1692015
ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech
X Wang, J Yamagishi, M Todisco, H Delgado, A Nautsch, N Evans, ...
Computer Speech & Language 64, 101114, 2020
1492020
Low-variance multitaper MFCC features: a case study in robust speaker verification
T Kinnunen, R Saeidi, F Sedlák, KA Lee, J Sandberg, ...
IEEE transactions on audio, speech, and language processing 20 (7), 1990-2001, 2012
1472012
ALIZE 3.0-open source toolkit for state-of-the-art speaker recognition
A Larcher, JF Bonastre, B Fauve, KA Lee, C Lévy, H Li, J Mason, ...
Annual Conference of the International Speech Communication Association, 2013
1452013
ASVspoof 2017 Version 2.0: meta-data analysis and baseline enhancements
H Delgado, M Todisco, M Sahidullah, N Evans, T Kinnunen, KA Lee, ...
Odyssey 2018-The Speaker and Language Recognition Workshop, 2018
1422018
Reddots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research
T Kinnunen, M Sahidullah, M Falcone, L Costantini, RG Hautamäki, ...
2017 IEEE International conference on acoustics, speech and signal …, 2017
1202017
An SVM kernel with GMM-supervector based on the Bhattacharyya distance for speaker recognition
CH You, KA Lee, H Li
IEEE Signal processing letters 16 (1), 49-52, 2008
1202008
GMM-SVM kernel with a Bhattacharyya-based distance for speaker recognition
CH You, KA Lee, H Li
IEEE Transactions on Audio, Speech, and Language Processing 18 (6), 1300-1312, 2009
1122009
The RSR2015: Database for text-dependent speaker verification using multiple pass-phrases
A Larcher, KA Lee, B Ma, H Li
Annual Conference of the International Speech Communication Association …, 2012
1112012
t-DCF: a detection cost function for the tandem assessment of spoofing countermeasures and automatic speaker verification
T Kinnunen, KA Lee, H Delgado, N Evans, M Todisco, M Sahidullah, ...
arXiv preprint arXiv:1804.09618, 2018
1052018
ASVspoof 2021: accelerating progress in spoofed and deepfake speech detection
J Yamagishi, X Wang, M Todisco, M Sahidullah, J Patino, A Nautsch, ...
arXiv preprint arXiv:2109.00537, 2021
1032021
Inherent decorrelating and least perturbation properties of the normalized subband adaptive filter
KA Lee, WS Gan
IEEE Transactions on Signal Processing 54 (11), 4475-4480, 2006
962006
I4U submission to NIST SRE 2012: A large-scale collaborative effort for noise-robust speaker verification
R Saedi, KA Lee, T Kinnunen, T Hasan, B Fauve, PM Bousquet, E Khoury, ...
Interspeech, 2013
942013
The system can't perform the operation now. Try again later.
Articles 1–20