|An overview of text-independent speaker recognition: From features to supervectors|
T Kinnunen, H Li
Speech Communication 52 (1), 12-40, 2010
|Spoofing and countermeasures for speaker verification: A survey|
Z Wu, N Evans, T Kinnunen, J Yamagishi, F Alegre, H Li
speech communication 66, 130-153, 2015
|Real-time speaker identification and verification|
T Kinnunen, E Karpov, P Franti
IEEE Transactions on Audio, Speech, and Language Processing 14 (1), 277-288, 2005
|ASVspoof 2015: the first automatic speaker verification spoofing and countermeasures challenge|
Z Wu, T Kinnunen, N Evans, J Yamagishi, C Hanilçi, M Sahidullah, ...
Sixteenth Annual Conference of the International Speech Communication …, 2015
|The ASVspoof 2017 challenge: Assessing the limits of replay spoofing attack detection|
T Kinnunen, M Sahidullah, H Delgado, M Todisco, N Evans, J Yamagishi, ...
ISCA (the International Speech Communication Association), 2017
|Spectral Features for Automatic Text-Independent Speaker Recognition. Licentiate˘s Thesis|
University of Joensuu, Department of computer science, Finland, 2003
|Spectral features for automatic text-independent speaker recognition|
Licentiatesthesis, Department of computer science, University of Joensuu, 2003
|Vulnerability of speaker verification systems against voice conversion spoofing attacks: The case of telephone speech|
T Kinnunen, ZZ Wu, KA Lee, F Sedlak, ES Chng, H Li
2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012
|A comparison of features for synthetic speech detection|
M Sahidullah, T Kinnunen, C Hanilçi
ISCA (the International Speech Communication Association), 2015
|Eye-movements as a biometric|
R Bednarik, T Kinnunen, A Mihaila, P Fränti
Scandinavian conference on image analysis, 780-789, 2005
|Spoofing and countermeasures for automatic speaker verification.|
NWD Evans, T Kinnunen, J Yamagishi
Interspeech, 925-929, 2013
|Low-variance multitaper MFCC features: a case study in robust speaker verification|
T Kinnunen, R Saeidi, F Sedlák, KA Lee, J Sandberg, ...
IEEE transactions on audio, speech, and language processing 20 (7), 1990-2001, 2012
|The voice conversion challenge 2018: Promoting development of parallel and nonparallel methods|
J Lorenzo-Trueba, J Yamagishi, T Toda, D Saito, F Villavicencio, ...
arXiv preprint arXiv:1804.04262, 2018
|A practical, self-adaptive voice activity detector for speaker verification with noisy telephone and microphone data|
T Kinnunen, P Rajan
2013 IEEE international conference on acoustics, speech and signal …, 2013
|Improving k-means by outlier removal|
V Hautamäki, S Cherednichenko, I Kärkkäinen, T Kinnunen, P Fränti
Image Analysis, 219-227, 2005
|A study on spoofing attack in state-of-the-art speaker verification: the telephone speech case|
Z Wu, T Kinnunen, ES Chng, H Li, E Ambikairajah
Proceedings of The 2012 Asia Pacific Signal and Information Processing …, 2012
|ASVspoof: the automatic speaker verification spoofing and countermeasures challenge|
Z Wu, J Yamagishi, T Kinnunen, C Hanilçi, M Sahidullah, A Sizov, ...
IEEE Journal of Selected Topics in Signal Processing 11 (4), 588-604, 2017
|The NIST 2014 speaker recognition i-vector machine learning challenge|
CS Greenberg, D Bansé, GR Doddington, D Garcia-Romero, JJ Godfrey, ...
Odyssey: The Speaker and Language Recognition Workshop, 224-230, 2014
|Voice activity detection using MFCC features and support vector machine|
T Kinnunen, E Chernenko, M Tuononen, P Fränti, H Li
Int. Conf. on Speech and Computer (SPECOM07), Moscow, Russia 2, 556-561, 2007
|Reddots replayed: A new replay spoofing attack corpus for text-dependent speaker verification research|
T Kinnunen, M Sahidullah, M Falcone, L Costantini, RG Hautamäki, ...
2017 IEEE International Conference on Acoustics, Speech and Signal …, 2017