Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Junichi YamagishiNational Institute of Informatics, Tokyo, JapanEmail verificata su nii.ac.jp
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceEmail verificata su eurecom.fr
- Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceEmail verificata su eurecom.fr
- Tomi KinnunenProfessor, University of Eastern FinlandEmail verificata su uef.fi
- Md SahidullahTCG CREST & Academy of Scientific and Innovative Research (AcSIR)Email verificata su tcgcrest.org
- Héctor DelgadoNuance CommunicationsEmail verificata su nuance.com
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongEmail verificata su ieee.org
- Jose PatinoCerence Inc.Email verificata su cerence.com
- Natalia TomashenkoInria, FranceEmail verificata su inria.fr
- Fuming FangAlibabaEmail verificata su alibaba-inc.com
- Ville VestmanEarly stage researcher, University of Eastern FinlandEmail verificata su uef.fi
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityEmail verificata su univ-avignon.fr
- Lauri JuvelaAssistant Professor, Machine Learning in Speech and Language Technology, Aalto UniversityEmail verificata su aalto.fi
- Paul-Gauthier NoéINRIA, Grenoble, FranceEmail verificata su inria.fr
- Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsEmail verificata su nii.ac.jp
- Cassia Valentini-BotinhaoUniversity of EdinburghEmail verificata su inf.ed.ac.uk
- Isao EchizenNational Institute of Informatics / University of Tokyo / SOKENDAIEmail verificata su nii.ac.jp
- Gustav Eje HenterKTH Royal Institute of Technology, Stockholm, SwedenEmail verificata su kth.se
- Manu AiraksinenHelsinki Universtiy HospitalEmail verificata su aalto.fi
- Cheng-I Jeff LaiMassachusetts Institute of TechnologyEmail verificata su mit.edu