Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
- Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeVerified email at u.nus.edu
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
- Bin MaAlibabaVerified email at alibaba-inc.com
- MEIGNIER SylvainProfessor in Computer Science, LIUM, Le Mans University, FranceVerified email at univ-lemans.fr
- driss matroufUniversity of Avignon - LIAVerified email at univ-avignon.fr
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
- Benoit FauveValidsoftVerified email at validsoft.com
- Pierre ChampionInriaVerified email at inria.fr
- Gaël Le LanMeta Reality LabsVerified email at meta.com
- marie tahonLIUM / Le Mans UniversitéVerified email at univ-lemans.fr
- Pierre-Michel BousquetLIA, Avignon UniversitéVerified email at univ-avignon.fr
- Ville HautamäkiAssociate Professor, University of Eastern FinlandVerified email at cs.uef.fi
- Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
- Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Verified email at idiap.ch
- Jean CarriveInstitut national de l'audiovisuelVerified email at ina.fr
- Corinne FredouilleUniversity of AvignonVerified email at univ-avignon.fr
- Jean-Hugh ThomasUniversité du MansVerified email at univ-lemans.fr
- David van LeeuwenICIS / FNWI, Radboud University NijmegenVerified email at science.ru.nl
- Hemlata TakPhDVerified email at pindrop.com