This paper introduces the HumTrans dataset, which is publicly available ...
The single-speaker singing voice synthesis (SVS) usually underperforms a...
While network slicing has become a prevalent approach to service
differe...
Bacterial cells are sensitive to a range of external signals used to lea...
This paper considers the discretization of the time-dependent Navier-Sto...
Probabilistic linear discriminant analysis (PLDA) is commonly used in sp...
Single channel target speaker separation (TSS) aims at extracting a spea...
Susceptibility tensor imaging (STI) is an emerging magnetic resonance im...
Typically, singing voice conversion (SVC) depends on an embedding vector...
Training a game-playing reinforcement learning agent requires multiple
i...
This paper considers the discretization of the Stokes equations with
Sco...
Split learning (SL) is a collaborative learning framework, which can tra...
Recently, many novel techniques have been introduced to deal with spoofi...
Graph Convolutional Networks (GCNs) achieve great success in non-Euclide...
Spectrum access system (SAS) is widely considered the de facto solution ...
For the discretization of the convective term in the Navier-Stokes equat...
A leaderboard named Speech processing Universal PERformance Benchmark
(S...
The purpose of Inventory Pricing is to bid the right prices to online ad...
Proper EMA-balance (E: kinetic energy; M: momentum; A: angular momentum)...
Recently, MLP-based vision backbones emerge. MLP-based vision architectu...
Existing approaches for anti-spoofing in automatic speaker verification ...
This paper describes a variational auto-encoder based non-autoregressive...
In the past decade, we have witnessed rapid progress in the machine visi...
Recently, visual Transformer (ViT) and its following works abandon the
c...
Previous works have shown that automatic speaker verification (ASV) is
s...
For the large sparse generalized absolute value equations (GAVEs) , the ...
Automatic speaker verification (ASV) is one of the core technologies in
...
In this paper, we investigate a radio access network (RAN) slicing probl...
In this paper, we construct a P_1^c⊕ RT0-P0 discretization of the
Stokes...
In the second part of this paper, we develop a centralized packet
transm...
In this two-part paper, we propose a novel medium access control (MAC)
p...
Existing approaches for replay and synthetic speech detection still lack...
Graph neural networks (GNNs) have achieved high performance in analyzing...
Quantitative Susceptibility Mapping (QSM) estimates tissue magnetic
susc...
With the increasing popularity of graph-based learning, Graph Neural Net...
Recently adversarial attacks on automatic speaker verification (ASV) sys...
Speaker verification systems usually suffer from the mismatch problem be...
Neuroscientific data analysis has traditionally relied on linear algebra...
Effective and Efficient spatio-temporal modeling is essential for action...
Training generative models that can generate high-quality text with
suff...
The paradigm of network function virtualization (NFV) with the support o...
Second language (L2) speech is often labeled with the native, phone
cate...
Multi-focus image fusion technologies compress different focus depth ima...
This work investigates the vulnerability of Gaussian Mix-ture Model (GMM...
In this paper, we consider the problem of open information extraction (O...
Service-oriented virtual network deployment is based on statistical reso...
In this paper, a comprehensive software-defined networking (SDN) based
t...
In this paper, a multi-scale framework with local region based active co...
In this paper, a new sequential surrogate-based optimization (SSBO) algo...
Neuroscientific data analysis has classically involved methods for
stati...