Get my own profile
Public access
View all29 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
- Héctor DelgadoResearch Scientist, MicrosoftVerified email at microsoft.com
- Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
- Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
- Md SahidullahTCG CREST & Academy of Scientific and Innovative Research (AcSIR)Verified email at tcgcrest.org
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
- Jose PatinoCerence Inc.Verified email at cerence.com
- Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
- Hemlata TakPhDVerified email at pindrop.com
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
- Natalia TomashenkoInria, FranceVerified email at inria.fr
- Ville VestmanEarly stage researcher, University of Eastern FinlandVerified email at uef.fi
- Giovanni SaggioUniversity of Rome "Tor Vergata"Verified email at uniroma2.it
- Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsVerified email at nii.ac.jp
- Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr
- Michele PanarielloEURECOMVerified email at eurecom.fr
- Jee-weon JungApple, Carnegie Mellon UniversityVerified email at ieee.org
- Brij Mohan Lal SrivastavaNijtaVerified email at nijta.com
- Madhu R. KambleSamsung R & D Institute, India, BangaloreVerified email at samsung.com
- Paul-Gauthier NoéINRIA, Grenoble, FranceVerified email at inria.fr