Crea il mio profilo
Accesso pubblico
Visualizza tutto28 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceEmail verificata su eurecom.fr
- Héctor DelgadoNuance CommunicationsEmail verificata su nuance.com
- Junichi YamagishiNational Institute of Informatics, Tokyo, JapanEmail verificata su nii.ac.jp
- Tomi KinnunenProfessor, University of Eastern FinlandEmail verificata su uef.fi
- Md SahidullahTCG CREST & Academy of Scientific and Innovative Research (AcSIR)Email verificata su tcgcrest.org
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongEmail verificata su ieee.org
- Jose PatinoCerence Inc.Email verificata su cerence.com
- Xin WangNational Institute of InformaticsEmail verificata su nii.ac.jp
- Hemlata TakPhDEmail verificata su pindrop.com
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityEmail verificata su univ-avignon.fr
- Natalia TomashenkoInria, FranceEmail verificata su inria.fr
- Giovanni SaggioUniversity of Rome "Tor Vergata"Email verificata su uniroma2.it
- Ville VestmanEarly stage researcher, University of Eastern FinlandEmail verificata su uef.fi
- Emmanuel VincentSenior Research Scientist, InriaEmail verificata su inria.fr
- Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsEmail verificata su nii.ac.jp
- Brij Mohan Lal SrivastavaInriaEmail verificata su inria.fr
- Paul-Gauthier NoéINRIA, Grenoble, FranceEmail verificata su inria.fr
- Jee-weon JungCarnegie Mellon UniversityEmail verificata su ieee.org
- Madhu R. KambleSamsung R & D Institute, India, BangaloreEmail verificata su samsung.com
- Marta Gomez-BarreroUniversität der Bundeswehr MünchenEmail verificata su unibw.de