Get my own profile
Public access
View all38 articles
1 article
available
not available
Based on funding mandates
Co-authors
Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceVerified email at eurecom.fr
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Héctor DelgadoNuance CommunicationsVerified email at nuance.com
Jose PatinoCerence Inc.Verified email at cerence.com
Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
Alegre FedericoValidSoft LimitedVerified email at validsoft.com
Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
Hemlata TakPhDVerified email at pindrop.com
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Simon BOZONNETEURECOMVerified email at eurecom.fr
Corinne FredouilleUniversity of AvignonVerified email at univ-avignon.fr
Zhizheng WuChinese University of Hong Kong, Shenzhen, Mel LabVerified email at cuhk.edu.cn
Natalia TomashenkoInria, FranceVerified email at inria.fr
Benoit FauveValidsoftVerified email at validsoft.com
Ravichander VipperlaSenior Applied Scientist, Amazon, Cambridge, UKVerified email at amazon.com
Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Verified email at idiap.ch
Jee-weon JungCarnegie Mellon UniversityVerified email at ieee.org
Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr
Dong Wang (王东)Associate Professor @ Tsinghua UniversityVerified email at mails.tsinghua.edu.cn