Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kong Aik LeeThe Hong Kong Polytechnic University, Hong KongEmail verificata su ieee.org
- Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeEmail verificata su u.nus.edu
- Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityEmail verificata su univ-avignon.fr
- Bin MaAlibabaEmail verificata su alibaba-inc.com
- MEIGNIER SylvainProfessor in Computer Science, LIUM, Le Mans University, FranceEmail verificata su univ-lemans.fr
- driss matroufUniversity of Avignon - LIAEmail verificata su univ-avignon.fr
- Benoit FauveValidsoftEmail verificata su validsoft.com
- Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceEmail verificata su eurecom.fr
- Gaël Le LanMeta Reality LabsEmail verificata su meta.com
- Pierre ChampionInriaEmail verificata su inria.fr
- Pierre-Michel BousquetLIA, Avignon UniversitéEmail verificata su univ-avignon.fr
- Ville HautamäkiAssociate Professor, University of Eastern FinlandEmail verificata su cs.uef.fi
- Tomi KinnunenProfessor, University of Eastern FinlandEmail verificata su uef.fi
- Sébastien MarcelSenior researcher ( Idiap research institute ) and Professor ( University of Lausanne )Email verificata su idiap.ch
- Corinne FredouilleUniversity of AvignonEmail verificata su univ-avignon.fr
- Jean CarriveInstitut national de l'audiovisuelEmail verificata su ina.fr
- David van LeeuwenICIS / FNWI, Radboud University NijmegenEmail verificata su science.ru.nl
- Nicolas SCHEFFERFacebook, IncEmail verificata su fb.com
- Philip A TresadernImaging Sciences / BII, University of ManchesterEmail verificata su manchester.ac.uk
- Tim CootesProfessor of Computer Vision, Imaging Sciences/Computer Science/BII, The University of ManchesterEmail verificata su manchester.ac.uk