Get my own profile
Public access
View all14 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Massimiliano TodiscoAssistant Professor, EURECOM, FranceVerified email at eurecom.fr
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Md SahidullahInstitute for Advancing Intelligence (IAI), TCG CRESTVerified email at tcgcrest.org
Héctor DelgadoNuance CommunicationsVerified email at nuance.com
Kong Aik LeeInstitute for Infocomm Research, A*STAR, SingaporeVerified email at ieee.org
Jose PatinoCerence Inc.Verified email at cerence.com
Fuming FangAlibabaVerified email at alibaba-inc.com
Ville VestmanEarly stage researcher, University of Eastern FinlandVerified email at uef.fi
Natalia TomashenkoLIA, University of Avignon, FranceVerified email at univ-avignon.fr
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Erica CooperNational Institute of InformaticsVerified email at nii.ac.jp
Lauri JuvelaAssistant Professor, Machine Learning in Speech and Language Technology, Aalto UniversityVerified email at aalto.fi
Jaime Lorenzo-TruebaAmazonVerified email at amazon.com
Cassia Valentini-BotinhaoUniversity of EdinburghVerified email at inf.ed.ac.uk
Isao EchizenNational Institute of Informatics / University of Tokyo / SOKENDAIVerified email at nii.ac.jp
Xuechen Liu(刘学琛)Postdoctoral researcher, National Institute of InformaticsVerified email at nii.ac.jp
Paul-Gauthier NoéAvignon UniversitéVerified email at univ-avignon.fr
Manu AiraksinenAalto UniversityVerified email at aalto.fi