Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Md SahidullahTCG CREST & Academy of Scientific and Innovative Research (AcSIR)Verified email at tcgcrest.org
- Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
- Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
- Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceVerified email at eurecom.fr
- Héctor DelgadoResearch Scientist, MicrosoftVerified email at microsoft.com
- Jose PatinoCerence Inc.Verified email at cerence.com
- Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
- Jiayu DUAlibaba DAMO AcademyVerified email at alibaba-inc.com
- Xingyu NaAppleVerified email at apple.com
- Pawel SwietojanskiResearch Scientist, AppleVerified email at apple.com
- Jee-weon JungApple, Carnegie Mellon UniversityVerified email at ieee.org
- Hye-jin ShimCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Hemlata TakPhDVerified email at pindrop.com
- Xiaoxiao MiaoSingapore Institute of TechnologyVerified email at SINGAPORETECH.EDU.SG
Follow
Xuechen Liu(刘学琛)
Postdoctoral researcher, National Institute of Informatics
Verified email at nii.ac.jp - Homepage