Crea il mio profilo
Accesso pubblico
Visualizza tutto32 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Haizhou LiThe Chinese University of Hong Kong, Shenzhen, China; NUS, SingaporeEmail verificata su u.nus.edu
Tomi KinnunenProfessor, University of Eastern FinlandEmail verificata su uef.fi
Simon KingProfessor of Speech Processing, University of EdinburghEmail verificata su ed.ac.uk
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanEmail verificata su nii.ac.jp
Eng-Siong ChngNanyang Technological UniversityEmail verificata su ntu.edu.sg
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceEmail verificata su eurecom.fr
Xiaohai TianNational University of Singapore (NUS)Email verificata su nus.edu.sg
Mirjam WesterIOHK & University of EdinburghEmail verificata su inf.ed.ac.uk
Alegre FedericoValidSoft LimitedEmail verificata su validsoft.com
Aleksandr SizovUniversity of Eastern FinlandEmail verificata su cs.uef.fi
Yao QianMicrosoftEmail verificata su microsoft.com
Md SahidullahInstitute for Advancing Intelligence (IAI), TCG CRESTEmail verificata su tcgcrest.org
Cemal HanilciAssociate Professor, Electrical and Electronics Engineering, Bursa Technical UniversityEmail verificata su btu.edu.tr
Tomoki TodaNagoya UniversityEmail verificata su icts.nagoya-u.ac.jp
Gustav Eje HenterKTH Royal Institute of Technology, Stockholm, SwedenEmail verificata su kth.se
Xiong XiaoPrincipal Applied scientist, MicrosoftEmail verificata su microsoft.com
Cassia Valentini-BotinhaoUniversity of EdinburghEmail verificata su inf.ed.ac.uk
Tuomas VirtanenTampere UniversityEmail verificata su tuni.fi
Siu Wa LeeTelecommunications Engineer, Office of the Communications AuthorityEmail verificata su ofca.gov.hk
Srikanth RonankiAmazonEmail verificata su amazon.com