А. С. Сизов

ORCID: 0000-0001-8110-9929
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Speech Recognition and Synthesis
  • Radio Astronomy Observations and Technology
  • Geophysics and Gravity Measurements
  • Speech and Audio Processing
  • Music and Audio Processing
  • Astronomical Observations and Instrumentation
  • Cybersecurity and Information Systems
  • Natural Language Processing Techniques
  • Sensor Technology and Measurement Systems
  • Advanced Measurement and Metrology Techniques
  • Planetary Science and Exploration
  • Gyrotron and Vacuum Electronics Research
  • Advanced Signal Processing Techniques
  • Superconducting and THz Device Technology
  • Authorship Attribution and Profiling
  • GNSS positioning and interference
  • Economic and Technological Systems Analysis
  • Scientific Research and Discoveries
  • Inertial Sensor and Navigation
  • Advanced Computational Techniques in Science and Engineering
  • Multi-Criteria Decision Making
  • Astrophysics and Cosmic Phenomena
  • Methane Hydrates and Related Phenomena
  • Computational Physics and Python Applications
  • Carbon Nanotubes in Composites

Southwest Minnesota State University
2019-2025

Kursk State University
2023

South-West State University
2008-2021

Kazan State Technological University
2019

University of Eastern Finland
2014-2017

Institute for Infocomm Research
2017

Agency for Science, Technology and Research
2016

Finland University
2015

An increasing number of independent studies have confirmed the vulnerability automatic speaker verification (ASV) technology to spoofing.However, in comparison that involving other biometric modalities, spoofing and countermeasure research for ASV is still its infancy.A current barrier progress lack standards which impedes results generated by different researchers.The ASVspoof initiative aims overcome this bottleneck through provision standard corpora, protocols metrics support a common...

10.21437/interspeech.2015-462 article EN Interspeech 2022 2015-09-06

Concerns regarding the vulnerability of automatic speaker verification (ASV) technology against spoofing can undermine confidence in its reliability and form a barrier to exploitation. The absence competitive evaluations lack common datasets has hampered progress developing effective countermeasures. This paper describes ASV Spoofing Countermeasures (ASVspoof) initiative, which aims fill this void. Through provision dataset, protocols, metrics, ASVspoof promotes sound research methodology...

10.1109/jstsp.2017.2671435 article EN IEEE Journal of Selected Topics in Signal Processing 2017-02-17

Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), no exception; replay, synthesis, conversion all provoke false acceptances unless countermeasures are used. We focus on (VC) considered as one of the most challenging for modern recognition systems. To detect spoofing, existing assume explicit or implicit knowledge a particular VC system designing discriminative features. In this paper, we explore back-end...

10.1109/tifs.2015.2407362 article EN IEEE Transactions on Information Forensics and Security 2015-02-26

Automatic speaker verification (ASV) systems are highly vulnerable against spoofing attacks, also known as imposture. With recent developments in speech synthesis and voice conversion technology, it has become important to detect synthesized or voice-converted for the security of ASV systems. In this paper, we compare five different classifiers used recognition synthetic speech. Experimental results conducted on ASVspoof 2015 dataset show that support vector machines with generalized linear...

10.21437/interspeech.2015-466 article EN Interspeech 2022 2015-09-06

The purpose of the research is to systematize properties data centers and find ways increase productivity a network based on collective access, combining steps storing processing information its replication. Methods . methods are theory organization complex analytical systems artificial intelligence systems. application principles distributed-territorial centers, deferred collection, computational models knowledge representation allows you create center architectures reconfigurable for basic...

10.21869/2223-1536-2024-14-4-146-163 article EN cc-by Proceedings of the Southwest State University Series IT Management Computer Science Computer Engineering Medical Equipment Engineering 2025-02-24

Any biometric recognizer is vulnerable to direct spoofing attacks and automatic speaker verification (ASV) no exception; replay, synthesis conversion all provoke false acceptances unless countermeasures are used.We focus on voice (VC) attacks.Most existing use full knowledge of a particular VC system detect spoofing.We study potentially more universal approach involving generative modeling perspective.Specifically, we adopt standard ivector representation probabilistic linear discriminant...

10.21437/interspeech.2014-13 article EN Interspeech 2022 2014-09-14

The series of language recognition evaluations (LRE's) conducted by the National Institute Standards and Technology (NIST) have been one driving forces in advancing spoken technology.This paper presents a shared view five institutions resulting from our collaboration toward LRE 2015 submissions under names I2R, Fan-tastic4, SingaMS.Among others, LRE'15 emphasizes on detection context closely related languages, which is different previous LRE's.From perspective system design, we witnessed...

10.21437/interspeech.2016-624 article EN Interspeech 2022 2016-08-28

Purpose of research. Creation and characterization carbon nanostructures by high-frequency magnetron sputtering from a target in argon on silicon substrate reactive nitrogen environment, obtained Ni catalyst buffer layer. Methods. High-frequency with changes control parameters: time power working gas pressure Ar N. Research was carried out using X-ray phase analysis, atomic force microscopy holographic microscopy, Raman scattering. Results. The formation nanotubes, including single-walled...

10.21869/2223-1528-2024-14-2-71-87 article EN Proceedings of the Southwest State University Series Engineering and Technologies 2024-07-01

Purpose of reseach. Development a forecast model energy consumption and assessment factors influencing its consumption. The obtained estimates will improve the quality efficiency management decisions at all levels administrative management. Methods. article presents an analytical review existing methods cognitive modelling forecasting electric power consumption, description software implementation information-computing system that allows to make by population administrative-territorial...

10.21869/2223-1560-2023-27-4-44-61 article EN cc-by Proceedings of Southwest State University 2024-03-01

We explore a method to boost discriminative capabilities of probabilistic linear discriminant analysis (PLDA) model without losing its generative advantages. show sequential projection and training steps leading classifier that operates in the original i-vector space but is discriminatively trained low-dimensional PLDA latent subspace. use extended Baum-Welch technique optimize with respect two objective functions for training. One them well-known maximum mutual information objective, while...

10.1109/taslp.2017.2651377 article EN IEEE/ACM Transactions on Audio Speech and Language Processing 2017-01-10

Purpose. Investigate the structural features of boron nitride films obtained by Langmuir-Blodgett method. Observe fluorescence spectra and determine band structure resulting coatings using optical methods. Methods. The deposition Langmuir was carried out KSV NIMA 2002 setup from colloidal solution ST BN/CHCl 3 . study properties conducted SF 2000 spectrophotometer in spectral range 200 – 1100 nm confocal Raman microspectrometer OmegaScope AIST-NT with resolution cm -1 Surface morphology...

10.21869/2223-1528-2023-13-2-105-116 article EN cc-by Proceedings of the Southwest State University Series Engineering and Technologies 2023-09-29

Purpose of reseach is to improve the operation technical systems or performance socio-economic by developing a fuzzy system for selecting supplier inventories in logistics companies. The relevance study determined absence approach formation procurement strategy overwhelming majority companies, which makes operations management analysis and evaluation process difficult. When making decisions concerning supplier, based on variety sources, various mathematical methods techniques are used;...

10.21869/2223-1560-2019-23-1-95-106 article EN cc-by Proceedings of Southwest State University 2019-06-08

This article describes the systems jointly submitted by Institute for Infocomm (I$^2$R), Laboratoire d'Informatique de l'Université du Maine (LIUM), Nanyang Technology University (NTU) and of Eastern Finland (UEF) 2015 NIST Language Recognition Evaluation (LRE). The system is a fusion nine sub-systems based on i-vectors extracted from different types features. Given i-vectors, several classifiers are adopted language detection task including support vector machines (SVM), multi-class...

10.48550/arxiv.1602.01929 preprint EN other-oa arXiv (Cornell University) 2016-01-01

Automatic speaker verification (ASV) technology is recently finding its way to end-user applications for secure access personal data, smart services or physical facilities. Similar other biometric technologies, vulnerable spoofing attacks where an attacker masquerades as a particular target via impersonation, replay, text-to-speech (TTS) voice conversion (VC) techniques gain illegitimate the system. We focus on TTS and VC that represent most flexible, high-end attacks. Most of prior studies...

10.48550/arxiv.1603.03947 preprint EN other-oa arXiv (Cornell University) 2016-01-01

The work is devoted to the consideration of approach effectiveness increase in socialeconomic system operation through fuzzy model development for supplier choice commoditymaterial stocks logistic companies. problem urgency conditioned on absence overwhelming majority companies formation procurement logistics strategy which makes difficulties process rapid management and charges efficient control. 
 theory sets a methodological ba-sis work. developed has practical value leadership

10.30987/article_5c8b5cec0607f7.86717782 article EN Bulletin of Bryansk state technical university 2019-03-15

Abstract Methods of molecular dynamic simulation the bombardment polymeric materials by low-energy (up to 100 eV) ions generated in radio-frequency low-pressure (13.3-133 Pa) plasma are discussed. A model RF treatment ultrahigh weight polyethylene (UHMWPE) has been developed. It established that UHMWPE argon initiates fast rotation polymer chains, and rupture intramolecular bonds.

10.1088/1742-6596/1328/1/012007 article EN Journal of Physics Conference Series 2019-10-01
Coming Soon ...