Get my own profile
Public access
View all28 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Héctor DelgadoNuance CommunicationsVerified email at nuance.com
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Md SahidullahTCG CREST & Academy of Scientific and Innovative Research (AcSIR)Verified email at tcgcrest.org
Jose PatinoCerence Inc.Verified email at cerence.com
Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
Hemlata TakPhDVerified email at pindrop.com
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Natalia TomashenkoInria, FranceVerified email at inria.fr
Giovanni SaggioUniversity of Rome "Tor Vergata"Verified email at uniroma2.it
Ville VestmanEarly stage researcher, University of Eastern FinlandVerified email at uef.fi
Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr
Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsVerified email at nii.ac.jp
Brij Mohan Lal SrivastavaInriaVerified email at inria.fr
Jee-weon JungCarnegie Mellon UniversityVerified email at ieee.org
Paul-Gauthier NoéINRIA, Grenoble, FranceVerified email at inria.fr
Michele PanarielloEURECOMVerified email at eurecom.fr
Madhu R. KambleSamsung R & D Institute, India, BangaloreVerified email at samsung.com