Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeVerified email at u.nus.edu
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Bin MaAlibabaVerified email at alibaba-inc.com
MEIGNIER SylvainProfessor in Computer Science, LIUM, Le Mans University, FranceVerified email at univ-lemans.fr
driss matroufUniversity of Avignon - LIAVerified email at univ-avignon.fr
Gaël Le LanMeta Reality LabsVerified email at meta.com
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
marie tahonLIUM / Le Mans UniversitéVerified email at univ-lemans.fr
Pierre ChampionInriaVerified email at inria.fr
Benoit FauveValidsoftVerified email at validsoft.com
Pierre-Michel BousquetLIA, Avignon UniversitéVerified email at alumni.univ-avignon.fr
Ville HautamäkiAssociate Professor, University of Eastern FinlandVerified email at cs.uef.fi
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Jean CarriveInstitut national de l'audiovisuelVerified email at ina.fr
Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Verified email at idiap.ch
Jean-Hugh ThomasUniversité du MansVerified email at univ-lemans.fr
David van LeeuwenICIS / FNWI, Radboud University NijmegenVerified email at science.ru.nl
Hemlata TakResearch Scientist, PindropVerified email at pindrop.com
Massimiliano TodiscoAssociate Professor, EURECOM, FranceVerified email at eurecom.fr