Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
- Waad Ben KhederPhD in computer science, Vocapia Research, FranceVerified email at vocapia.com
- driss matroufUniversity of Avignon - LIAVerified email at univ-avignon.fr
- Juliette KahnLNEVerified email at lne.fr
- Pierre-Michel BousquetLIA, Avignon UniversitéVerified email at univ-avignon.fr
- Benjamin LecouteuxProfessor - GETALP team - LIG - Université Grenoble AlpesVerified email at imag.fr
- François Portetprofesseur, Laboratoire d'Informatique de Grenoble, Univ Grenoble AlpesVerified email at imag.fr
- Michel VacherCNRS - LIGVerified email at imag.fr
- Itshak LapidotAfeka Tel-Aviv Academic College of EngineeringVerified email at afeka.ac.il
- Mickael RouvierUniversity of Avignon - LIAVerified email at univ-avignon.fr
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
- Weimin MaShanghai Normal UniversityVerified email at shnu.edu.cn
- Liang HETsinghua UniversityVerified email at mail.tsinghua.edu.cn
- Ville HautamäkiAssociate Professor, University of Eastern FinlandVerified email at cs.uef.fi
- Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceVerified email at eurecom.fr
- Héctor DelgadoResearch Scientist, MicrosoftVerified email at microsoft.com
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
- Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
- M.W. MakThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
- Rahim SaeidiPrincipal Data Scientist at ZscalerVerified email at zscaler.com