Crea il mio profilo
Accesso pubblico
Visualizza tutto35 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeEmail verificata su u.nus.edu
- Tomi KinnunenProfessor, University of Eastern FinlandEmail verificata su uef.fi
- Simon KingProfessor of Speech Processing, University of EdinburghEmail verificata su ed.ac.uk
- Junichi YamagishiNational Institute of Informatics, Tokyo, JapanEmail verificata su nii.ac.jp
- Eng-Siong ChngNanyang Technological UniversityEmail verificata su ntu.edu.sg
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceEmail verificata su eurecom.fr
- Xiaohai TianNational University of Singapore (NUS)Email verificata su nus.edu.sg
- Mirjam WesterIOG (IOHK) & University of EdinburghEmail verificata su inf.ed.ac.uk
- Alegre FedericoValidSoft LimitedEmail verificata su validsoft.com
- Aleksandr SizovUniversity of Eastern FinlandEmail verificata su cs.uef.fi
- Yao QianMicrosoftEmail verificata su microsoft.com
- Tomoki TodaNagoya UniversityEmail verificata su icts.nagoya-u.ac.jp
- Xiong XiaoPrincipal Applied scientist, MicrosoftEmail verificata su microsoft.com
- Gustav Eje HenterKTH Royal Institute of Technology, Stockholm, SwedenEmail verificata su kth.se
- Cassia Valentini-BotinhaoUniversity of EdinburghEmail verificata su inf.ed.ac.uk
- Siu Wa LeeTelecommunications Engineer, Office of the Communications AuthorityEmail verificata su ofca.gov.hk
- Tuomas VirtanenTampere UniversityEmail verificata su tuni.fi
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongEmail verificata su ieee.org
- Srikanth RonankiAmazonEmail verificata su amazon.com
- Lei XieNorthwestern Polytechnical UniversityEmail verificata su nwpu.edu.cn