Skip to main content

Showing 1–3 of 3 results for author: Malykh, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.13068  [pdf, other

    cs.IR cs.LG

    UNICON: A unified framework for behavior-based consumer segmentation in e-commerce

    Authors: Manuel Dibak, Vladimir Vlasov, Nour Karessli, Darya Dedik, Egor Malykh, Jacek Wasilewski, Ton Torres, Ana Peleteiro Ramallo

    Abstract: Data-driven personalization is a key practice in fashion e-commerce, improving the way businesses serve their consumers needs with more relevant content. While hyper-personalization offers highly targeted experiences to each consumer, it requires a significant amount of private data to create an individualized journey. To alleviate this, group-based personalization provides a moderate level of per… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  2. arXiv:1705.10134  [pdf, other

    cs.SD cs.LG

    On Residual CNN in text-dependent speaker verification task

    Authors: Egor Malykh, Sergey Novoselov, Oleg Kudashev

    Abstract: Deep learning approaches are still not very common in the speaker verification field. We investigate the possibility of using deep residual convolutional neural network with spectrograms as an input features in the text-dependent speaker verification task. Despite the fact that we were not able to surpass the baseline system in quality, we achieved a quite good results for such a new approach gett… ▽ More

    Submitted 30 May, 2017; v1 submitted 29 May, 2017; originally announced May 2017.

    Comments: Accepted for Specom 2017

  3. arXiv:1705.08858  [pdf, other

    cs.SD cs.LG stat.ML

    Audio-replay attack detection countermeasures

    Authors: Galina Lavrentyeva, Sergey Novoselov, Egor Malykh, Alexander Kozlov, Oleg Kudashev, Vadim Shchemelinin

    Abstract: This paper presents the Speech Technology Center (STC) replay attack detection systems proposed for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017. In this study we focused on comparison of different spoofing detection approaches. These were GMM based methods, high level features extraction with simple classifier and deep learning frameworks. Experiments performed on th… ▽ More

    Submitted 24 May, 2017; originally announced May 2017.

    Comments: 11 pages, 3 figures, accepted for Specom 2017