default search action
Wei-Tyng Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j5]Wei-Tyng Hong, Kuldeep Singh Rana:
A ChannelWise weighting technique of slice-based Temporal Convolutional Network for noisy speech enhancement. Comput. Speech Lang. 84: 101572 (2024) - 2013
- [j4]Wei-Tyng Hong:
Minimum Classification Error Training of Hidden Conditional Random Fields for Speech and Speaker Recognition. J. Inf. Sci. Eng. 29(4): 729-742 (2013) - 2012
- [j3]Wei-Tyng Hong:
HCRF-UBM approach for text-independent speaker identification. Comput. Math. Appl. 64(5): 1120-1127 (2012) - [j2]Chien-Cheng Lee, Cheng-Yuan Shih, Shih-Kai Lee, Wei-Tyng Hong:
Enhancement of blood vessels in retinal imaging using the nonsubsampled contourlet transform. Multidimens. Syst. Signal Process. 23(4): 423-436 (2012) - 2000
- [j1]Wei-Tyng Hong, Sin-Horng Chen:
A robust training algorithm for adverse speech recognition. Speech Commun. 30(4): 273-293 (2000)
Conference and Workshop Papers
- 2021
- [c18]Kuldeep Singh Rana, Li-Wen Chen, Li-Hsin Tang, Wei-Tyng Hong:
A Study on Speech Enhancement Using Deep Temporal Convolutional Neural Network. ICCE-TW 2021: 1-2 - 2020
- [c17]Wei-Tyng Hong, Bubacarr Jallow, Po-En Chung:
Feasibility analysis of dye color modeling in clothing industries with machine learning models. ICCE-TW 2020: 1-2 - 2016
- [c16]Wei-Tyng Hong:
A resource-constrained HCRF modeling for a large-scale speaker identification task. GCCE 2016: 1-2 - 2015
- [c15]Wei-Tyng Hong:
HCRF-driven beamforming for reverberant speech recognition. ICMLC 2015: 578-581 - 2014
- [c14]Wei-Tyng Hong:
Fast HMM-driven beamforming for robust speech recognition in reverberant environments. ICMLC 2014: 529-532 - 2013
- [c13]Wei-Tyng Hong:
HCRF-based model compensation for noisy speech recognition. ISCE 2013: 277-278 - 2012
- [c12]Rudolf B. Blazek, Wei-Tyng Hong:
Robust Hierarchical Linear Model Comparison for End-of-Utterance Detection under Noisy Environments. ISBAST 2012: 126-133 - 2011
- [c11]Chih-Chang Yu, Hsu-Yung Cheng, Bor-Shenn Jeng, Chien-Cheng Lee, Wei-Tyng Hong:
Human-Centered Fingertip Mandarin Input System Using Single Camera. MMM (2) 2011: 187-195 - 2010
- [c10]Wei-Tyng Hong:
Speaker identification using Hidden Conditional Random Field-based speaker models. ICMLC 2010: 2811-2816 - 2009
- [c9]Wei-Tyng Hong, Hong-Ci Chen, I-Bin Liao, Wern-Jun Wang:
資源受限運算環境下華英混雜語音辨識系統 (Mandarin/English Mixed-Lingual Speech Recognition System on Resource-Constrained Platforms) [In Chinese]. ROCLING 2009 - 2003
- [c8]Wei-Tyng Hong:
A discriminative and robust training algorithm for noisy speech recognition. ICASSP (1) 2003: 8-11 - 2002
- [c7]Wei-Tyng Hong:
An RNN-based channel classification for Mandarin speech recognition over GSM/PSTN transmission environments. ICASSP 2002: 1033-1036 - [c6]Wei-Tyng Hong, Ke-Shiu Chen:
An investigation on wireless speech recognition by data contamination and robust training techniques. ISCSLP 2002 - 1999
- [c5]Wei-Tyng Hong, Sin-Horng Chen:
A segment-based C0 adaptation scheme for PMC-based noisy Mandarin speech recognition. ICASSP 1999: 433-436 - [c4]Wei-Tyng Hong, Sin-Horng Chen:
A robust environment-effects suppression training algorithm for adverse Mandarin speech recognition. EUROSPEECH 1999: 2495-2498 - [c3]Peng-Ren Lu, Wei-Tyng Hong, Sheng-Lun Chiang, Yih-Ru Wang, Sin-Horng Chen:
A prototype of Mandarin speech telephone number inquiry system. EUROSPEECH 1999 - 1998
- [c2]Wei-Tyng Hong, Sin-Horng Chen:
A Robust Training Algorithm for Noisy Mandarin Speech Recognition. ISCSLP 1998 - 1997
- [c1]Wei-Tyng Hong, Sin-Horng Chen:
A robust RNN-based pre-classification for noisy Mandarin speech recognition. EUROSPEECH 1997: 1083-1086
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-27 00:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint