Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
- Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceVerified email at eurecom.fr
- Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
- Héctor DelgadoResearch Scientist, MicrosoftVerified email at microsoft.com
- Natalia TomashenkoInria, FranceVerified email at inria.fr
- Hemlata TakPhDVerified email at pindrop.com
- Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
- Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr
- Brij Mohan Lal SrivastavaNijtaVerified email at nijta.com
- Paul-Gauthier NoéINRIA, Grenoble, FranceVerified email at inria.fr
- Md SahidullahTCG CREST & Academy of Scientific and Innovative Research (AcSIR)Verified email at tcgcrest.org
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
- Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
- Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsVerified email at nii.ac.jp
- Madhu R. KambleSamsung R & D Institute, India, BangaloreVerified email at samsung.com
- Wanying GeNational Institute of InformaticsVerified email at nii.ac.jp
- Jee-weon JungApple, Carnegie Mellon UniversityVerified email at ieee.org
- Anthony LarcherProfessor Le Mans UniversitéVerified email at univ-lemans.fr
- Claude BarrasLIMSI Université Paris-SudVerified email at limsi.fr
- Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Verified email at idiap.ch