Get my own profile
Public access
View all39 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceVerified email at eurecom.fr
- Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
- Héctor DelgadoResearch Scientist, MicrosoftVerified email at microsoft.com
- Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
- Jose PatinoCerence Inc.Verified email at cerence.com
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
- Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
- Hemlata TakPhDVerified email at pindrop.com
- Alegre FedericoValidSoft LimitedVerified email at validsoft.com
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
- Simon BOZONNETEURECOMVerified email at eurecom.fr
- Corinne FredouilleUniversity of AvignonVerified email at univ-avignon.fr
- Zhizheng WuThe Chinese University of Hong Kong, Shenzhen, Mel LabVerified email at cuhk.edu.cn
- Jee-weon JungApple, Carnegie Mellon UniversityVerified email at ieee.org
- Natalia TomashenkoInria, FranceVerified email at inria.fr
- Benoit FauveValidsoftVerified email at validsoft.com
- Ravichander VipperlaSenior Applied Scientist, Amazon, Cambridge, UKVerified email at amazon.com
- Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Verified email at idiap.ch
- Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr
- Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsVerified email at nii.ac.jp