Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceEmail verificata su eurecom.fr
- Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceEmail verificata su eurecom.fr
- Junichi YamagishiNational Institute of Informatics, Tokyo, JapanEmail verificata su nii.ac.jp
- Héctor DelgadoResearch Scientist, MicrosoftEmail verificata su microsoft.com
- Natalia TomashenkoInria, FranceEmail verificata su inria.fr
- Hemlata TakPhDEmail verificata su pindrop.com
- Xin WangNational Institute of InformaticsEmail verificata su nii.ac.jp
- Emmanuel VincentSenior Research Scientist, InriaEmail verificata su inria.fr
- Brij Mohan Lal SrivastavaNijtaEmail verificata su nijta.com
- Paul-Gauthier NoéINRIA, Grenoble, FranceEmail verificata su inria.fr
- Md SahidullahTCG CREST & Academy of Scientific and Innovative Research (AcSIR)Email verificata su tcgcrest.org
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongEmail verificata su ieee.org
- Tomi KinnunenProfessor, University of Eastern FinlandEmail verificata su uef.fi
- Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsEmail verificata su nii.ac.jp
- Madhu R. KambleSamsung R & D Institute, India, BangaloreEmail verificata su samsung.com
- Wanying GeNational Institute of InformaticsEmail verificata su nii.ac.jp
- Jee-weon JungApple, Carnegie Mellon UniversityEmail verificata su ieee.org
- Anthony LarcherProfessor Le Mans UniversitéEmail verificata su univ-lemans.fr
- Claude BarrasLIMSI Université Paris-SudEmail verificata su limsi.fr
- Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Email verificata su idiap.ch