The non-trusty clown attack on model-based speaker recognition systems

Alireza Farrokh Baroughi, Scott Craver. The non-trusty clown attack on model-based speaker recognition systems. In Adnan M. Alattar, Nasir D. Memon, Chad Heitzenrater, editors, Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, February 9-11, 2015, Proceedings. Volume 9409 of SPIE Proceedings, pages 940904, SPIE, 2015. [doi]

@inproceedings{BaroughiC15,
  title = {The non-trusty clown attack on model-based speaker recognition systems},
  author = {Alireza Farrokh Baroughi and Scott Craver},
  year = {2015},
  doi = {10.1117/12.2083412},
  url = {http://dx.doi.org/10.1117/12.2083412},
  researchr = {https://researchr.org/publication/BaroughiC15},
  cites = {0},
  citedby = {0},
  pages = {940904},
  booktitle = {Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, February 9-11, 2015, Proceedings},
  editor = {Adnan M. Alattar and Nasir D. Memon and Chad Heitzenrater},
  volume = {9409},
  series = {SPIE Proceedings},
  publisher = {SPIE},
  isbn = {978-1-6284-1499-8},
}