First Page | Document Content | |
---|---|---|
![]() Date: 2013-10-07 08:11:17Computational linguistics Cyberwarfare Human communication Speech recognition Biometrics Speaker recognition Speech synthesis Spoofing attack Attack Computer network security Automatic identification and data capture Science | Source URL: www.cstr.ed.ac.ukDownload Document from Source WebsiteFile Size: 336,77 KBShare Document on Facebook |