Search Results for author: Alexey Sholokhov

Found 5 papers, 3 papers with code

Probabilistic Back-ends for Online Speaker Recognition and Clustering

1 code implementation19 Feb 2023 Alexey Sholokhov, Nikita Kuzmin, Kong Aik Lee, Eng Siong Chng

This paper focuses on multi-enrollment speaker recognition which naturally occurs in the task of online speaker clustering, and studies the properties of different scoring back-ends in this scenario.

Clustering Online Clustering +1

Baselines and Protocols for Household Speaker Recognition

1 code implementation30 Apr 2022 Alexey Sholokhov, Xuechen Liu, Md Sahidullah, Tomi Kinnunen

Speaker recognition on household devices, such as smart speakers, features several challenges: (i) robustness across a vast number of heterogeneous domains (households), (ii) short utterances, (iii) possibly absent speaker labels of the enrollment data (passive enrollment), and (iv) presence of unknown persons (guests).

Speaker Recognition

Magnitude-aware Probabilistic Speaker Embeddings

1 code implementation28 Feb 2022 Nikita Kuzmin, Igor Fedorov, Alexey Sholokhov

We propose a new probabilistic speaker embedding extractor using the information encoded in the embedding magnitude and leverage it in the speaker verification pipeline.

Out-of-Distribution Detection Speaker Verification

Extrapolating false alarm rates in automatic speaker verification

no code implementations8 Aug 2020 Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee

Automatic speaker verification (ASV) vendors and corpus providers would both benefit from tools to reliably extrapolate performance metrics for large speaker populations without collecting new speakers.

Speaker Verification

Voice Biometrics Security: Extrapolating False Alarm Rate via Hierarchical Bayesian Modeling of Speaker Verification Scores

no code implementations4 Nov 2019 Alexey Sholokhov, Tomi Kinnunen, Ville Vestman, Kong Aik Lee

We put forward a novel performance assessment framework to address both the inadequacy of the random-impostor evaluation model and the size limitation of evaluation corpora by addressing ASV security against closest impostors on arbitrarily large datasets.

Speaker Verification

Cannot find the paper you are looking for? You can Submit a new open access paper.