Get my own profile
Public access
View all15 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
- Benoit FauveValidsoftVerified email at validsoft.com
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
- Farzin DeraviProfessor of Information Engineering, University of KentVerified email at kent.ac.uk
- Matt RoachSwansea UniversityVerified email at swansea.ac.uk
- Ruben Vera-RodriguezAssociate Professor, Universidad Autonoma de MadridVerified email at uam.es
- Anthony LarcherProfessor Le Mans UniversitéVerified email at univ-lemans.fr
- Julian FIERREZFull Professor, Universidad Autonoma de MadridVerified email at uam.es
- Nicolas SCHEFFERFacebook, IncVerified email at fb.com
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
- Paul David LedgerProfessor of Appled Mathematics, School of Computing & Mathematical Sciences, Uni. of LeicesterVerified email at leicester.ac.uk
- Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeVerified email at u.nus.edu
- laurent besacierProfessor in Computer ScienceVerified email at imag.fr
- Rita BorgoInformatics Department, King's College LondonVerified email at kcl.ac.uk
- Jean HennebertFull Professor in Machine Learning, University of Applied Sciences, HES-SO. Institute lead at iCoSysVerified email at hefr.ch
- Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Verified email at idiap.ch