Get my own profile
Public access
View all26 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yannick EstèveProfessor in Computer Science, University of Avignon, FranceVerified email at univ-avignon.fr
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr
Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceVerified email at eurecom.fr
Jose PatinoSenior Research Scientist, Cerence AIVerified email at cerence.com
Brij Mohan Lal SrivastavaNijtaVerified email at nijta.com
Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
Salima MdhaffarResearcher, University of AvignonVerified email at univ-avignon.fr
laurent besacierProfessor in Computer ScienceVerified email at imag.fr
Paul-Gauthier NoéINRIA, Grenoble, FranceVerified email at inria.fr
Marc TommasiProfessor of Computer Science, Lille UniversityVerified email at univ-lille.fr
Marcely Zanon BoitoResearch Scientist at NAVER LABS EuropeVerified email at naverlabs.com
Benjamin LecouteuxProfessor - GETALP team - LIG - Université Grenoble AlpesVerified email at imag.fr
Didier SchwabUniv. Grenoble Alpes, LIG-GETALPVerified email at univ-grenoble-alpes.fr
Mohamed MaoucheInriaVerified email at inria.fr
Antoine CaubrièreResearcher - Orange InnovationVerified email at orange.com
Xiaoxiao MiaoSingapore Institute of TechnologyVerified email at SINGAPORETECH.EDU.SG
Phuong-Hang LeUniv. Grenoble Alpes, CNRS, LIGVerified email at univ-grenoble-alpes.fr