Publications
Found 983 results
Author [ Title![(Asc)](https://icsi.berkeley.edu/icsi/sites/all/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is M [Clear All Filters]
(2013).
(2013).
You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016). You Only Click Twice: FinFisher's Global Proliferation.
The Citizen Lab.
(2013). You Only Click Twice: FinFisher's Global Proliferation.
The Citizen Lab.
(2013).
(2010).
(2010).
Word-Conditioned Phone N-Grams for Speaker Recognition.
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 253-256.
(2007). Word-Conditioned HMM Supervectors for Speaker Recognition.
Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 746-749.
(2007). Wide-Band Perceptual Audio Coding Based on Frequency-Domain Linear Prediction.
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 1, 265-268.
(2007). Why Is ASR Harder For Fast Speech And What Can We Do About It?.
IEEE Snowbird Workshop '95.
(1995). Why Is ASR Harder For Fast Speech And What Can We Do About It?.
IEEE Snowbird Workshop '95.
(1995).
(2009).
(2009).
(2009).
(2012).
(2014).
(2014). When a Mismatch Can Be Good: Large Vocabulary Speech Recognition Trained with Idealized Tandem Features.
1574-1577.
(2008). What's New in Government-Sponsored Speech Recognition Research.
Speech Technology Magazine. 7,
(2002).
(2011).
(1997). “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S..
Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
(2018).
(1993). Weighted SGD for ℓp Regression with Randomized Preconditioning.
Proceedings of the 27th Annual SODA Conference. 558-569.
(2015).