Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeVerified email at u.nus.edu
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Bin MaAlibabaVerified email at alibaba-inc.com
MEIGNIER SylvainProfessor in Computer Science, LIUM, Le Mans University, FranceVerified email at univ-lemans.fr
driss matroufUniversity of Avignon - LIAVerified email at univ-avignon.fr
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Benoit FauveValidsoftVerified email at validsoft.com
Pierre ChampionInriaVerified email at inria.fr
Gaël Le LanMeta Reality LabsVerified email at meta.com
marie tahonLIUM / Le Mans UniversitéVerified email at univ-lemans.fr
Pierre-Michel BousquetLIA, Avignon UniversitéVerified email at alumni.univ-avignon.fr
Ville HautamäkiAssociate Professor, University of Eastern FinlandVerified email at cs.uef.fi
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Verified email at idiap.ch
Jean CarriveInstitut national de l'audiovisuelVerified email at ina.fr
Corinne FredouilleUniversity of AvignonVerified email at univ-avignon.fr
Jean-Hugh ThomasUniversité du MansVerified email at univ-lemans.fr
David van LeeuwenICIS / FNWI, Radboud University NijmegenVerified email at science.ru.nl
Hemlata TakResearch Scientist, PindropVerified email at pindrop.com