Get my own profile
Public access
View all31 articles
1 article
available
not available
Based on funding mandates
Co-authors
Haizhou LiThe Chinese University of Hong Kong, Shenzhen, China; NUS, SingaporeVerified email at u.nus.edu
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Simon KingProfessor of Speech Processing, University of EdinburghVerified email at ed.ac.uk
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Eng-Siong ChngNanyang Technological UniversityVerified email at ntu.edu.sg
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Xiaohai TianNational University of Singapore (NUS)Verified email at nus.edu.sg
Mirjam WesterIOHK & University of EdinburghVerified email at inf.ed.ac.uk
Alegre FedericoValidSoft LimitedVerified email at validsoft.com
Aleksandr SizovUniversity of Eastern FinlandVerified email at cs.uef.fi
Yao QianMicrosoftVerified email at microsoft.com
Md SahidullahInstitute for Advancing Intelligence (IAI), TCG CRESTVerified email at tcgcrest.org
Cemal HanilciAssociate Professor, Electrical and Electronics Engineering, Bursa Technical UniversityVerified email at btu.edu.tr
Tomoki TodaNagoya UniversityVerified email at icts.nagoya-u.ac.jp
Gustav Eje HenterKTH Royal Institute of Technology, Stockholm, SwedenVerified email at kth.se
Xiong XiaoPrincipal Applied scientist, MicrosoftVerified email at microsoft.com
Cassia Valentini-BotinhaoUniversity of EdinburghVerified email at inf.ed.ac.uk
Tuomas VirtanenTampere UniversityVerified email at tuni.fi
Siu Wa LeeTelecommunications Engineer, Office of the Communications AuthorityVerified email at ofca.gov.hk
Srikanth RonankiAmazonVerified email at amazon.com