Get my own profile
Public access
View all15 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Benoit FauveValidsoftVerified email at validsoft.com
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Farzin DeraviProfessor of Information Engineering, University of KentVerified email at kent.ac.uk
Matt RoachSwansea UniversityVerified email at swansea.ac.uk
Ruben Vera-RodriguezAssociate Professor, Universidad Autonoma de MadridVerified email at uam.es
Anthony LarcherProfessor Le Mans UniversitéVerified email at univ-lemans.fr
Julian FIERREZFull Professor, Universidad Autonoma de MadridVerified email at uam.es
Nicolas SCHEFFERFacebook, IncVerified email at fb.com
Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongVerified email at ieee.org
Paul David LedgerProfessor of Computational Mathematics, School of Computing & Mathematics, Keele UniversityVerified email at keele.ac.uk
Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeVerified email at u.nus.edu
laurent besacierProfessor in Computer ScienceVerified email at imag.fr
Rita BorgoInformatics Department, King's College LondonVerified email at kcl.ac.uk
Jean HennebertFull Professor in Machine Learning, University of Applied Sciences, HES-SO. Institute lead at iCoSysVerified email at hefr.ch
Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Verified email at idiap.ch