Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Héctor DelgadoResearch Scientist, MicrosoftVerified email at microsoft.com
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Md SahidullahTCG CREST & Academy of Scientific and Innovative Research (AcSIR)Verified email at tcgcrest.org
Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
Jose PatinoSenior Research Scientist, Cerence AIVerified email at cerence.com
Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
Hemlata TakResearch Scientist, PindropVerified email at pindrop.com
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Natalia TomashenkoInria, FranceVerified email at inria.fr
Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsVerified email at nii.ac.jp
Ville VestmanEarly stage researcher, University of Eastern FinlandVerified email at uef.fi
Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr
Giovanni SaggioUniversity of Rome "Tor Vergata"Verified email at uniroma2.it
Michele PanarielloEURECOMVerified email at eurecom.fr
Jee-weon JungApple, Carnegie Mellon UniversityVerified email at ieee.org
Brij Mohan Lal SrivastavaNijtaVerified email at nijta.com
Marta Gomez-BarreroUniversität der Bundeswehr MünchenVerified email at unibw.de
Madhu R. KambleSamsung R & D Institute, India, BangaloreVerified email at samsung.com