Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityEmail verificata su univ-avignon.fr
- Waad Ben KhederPhD in computer science, Vocapia Research, FranceEmail verificata su vocapia.com
- driss matroufUniversity of Avignon - LIAEmail verificata su univ-avignon.fr
- Juliette KahnLNEEmail verificata su lne.fr
- Pierre-Michel BousquetLIA, Avignon UniversitéEmail verificata su univ-avignon.fr
- Benjamin LecouteuxProfessor - GETALP team - LIG - Université Grenoble AlpesEmail verificata su imag.fr
- François Portetprofesseur, Laboratoire d'Informatique de Grenoble, Univ Grenoble AlpesEmail verificata su imag.fr
- Michel VacherCNRS - LIGEmail verificata su imag.fr
- Itshak LapidotAfeka Tel-Aviv Academic College of EngineeringEmail verificata su afeka.ac.il
- Mickael RouvierUniversity of Avignon - LIAEmail verificata su univ-avignon.fr
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongEmail verificata su ieee.org
- Weimin MaShanghai Normal UniversityEmail verificata su shnu.edu.cn
- Liang HETsinghua UniversityEmail verificata su mail.tsinghua.edu.cn
- Ville HautamäkiAssociate Professor, University of Eastern FinlandEmail verificata su cs.uef.fi
- Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceEmail verificata su eurecom.fr
- Héctor DelgadoNuance CommunicationsEmail verificata su nuance.com
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceEmail verificata su eurecom.fr
- Tomi KinnunenProfessor, University of Eastern FinlandEmail verificata su uef.fi
- M.W. MakThe Hong Kong Polytechnic UniversityEmail verificata su polyu.edu.hk
- Rahim SaeidiPrincipal Data Scientist at ZscalerEmail verificata su zscaler.com