Get my own profile
Public access
View all34 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeVerified email at u.nus.edu
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Simon KingProfessor of Speech Processing, University of EdinburghVerified email at ed.ac.uk
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Eng-Siong ChngNanyang Technological UniversityVerified email at ntu.edu.sg
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Xiaohai TianNational University of Singapore (NUS)Verified email at nus.edu.sg
Yuancheng WangThe Chinese University of Hong Kong, ShenzhenVerified email at link.cuhk.edu.cn
Mirjam WesterIOG (IOHK) & University of EdinburghVerified email at inf.ed.ac.uk
Alegre FedericoValidSoft LimitedVerified email at validsoft.com
Aleksandr SizovUniversity of Eastern FinlandVerified email at cs.uef.fi
Tomoki TodaNagoya UniversityVerified email at icts.nagoya-u.ac.jp
Yao QianMicrosoftVerified email at microsoft.com
Xueyao ZhangThe Chinese University of Hong Kong, ShenzhenVerified email at link.cuhk.edu.cn
Yicheng GuAalto UniversityVerified email at aalto.fi
Liumeng XueHong Kong University of Science and TechnologyVerified email at ust.hk
Xiong XiaoPrincipal Applied scientist, MicrosoftVerified email at microsoft.com
Srikanth RonankiAmazonVerified email at amazon.com
Gustav Eje HenterKTH Royal Institute of Technology, Stockholm, SwedenVerified email at kth.se
Cassia Valentini-BotinhaoUniversity of EdinburghVerified email at inf.ed.ac.uk