Get my own profile
Public access
View all25 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yannick EstèveProfessor in Computer Science, University of Avignon, FranceVerified email at univ-avignon.fr
Jean-Francois BonastreDirecteur de Recherche @ Inria Defense&Security and Professor, LIA @ Avignon UniversityVerified email at univ-avignon.fr
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Massimiliano TodiscoAssociate Professor (MCF), EURECOM, FranceVerified email at eurecom.fr
Emmanuel VincentSenior Research Scientist, InriaVerified email at inria.fr
Jose PatinoCerence Inc.Verified email at cerence.com
Brij Mohan Lal SrivastavaInriaVerified email at inria.fr
Salima MdhaffarResearcher, University of AvignonVerified email at univ-avignon.fr
laurent besacierProfessor in Computer ScienceVerified email at imag.fr
Paul-Gauthier NoéINRIA, Grenoble, FranceVerified email at inria.fr
Xin WangNational Institute of InformaticsVerified email at nii.ac.jp
Marcely Zanon BoitoResearch Scientist at NAVER LABS EuropeVerified email at naverlabs.com
Benjamin LecouteuxProfessor - GETALP team - LIG - Université Grenoble AlpesVerified email at imag.fr
Antoine CaubrièreResearcher - Orange InnovationVerified email at orange.com
Marc TommasiProfessor of Computer Science, Lille UniversityVerified email at univ-lille.fr
Mohamed MaoucheInriaVerified email at inria.fr
Didier SchwabUniv. Grenoble Alpes, LIG-GETALPVerified email at univ-grenoble-alpes.fr
Sina AlisamirLIG, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Phuong-Hang LeUniv. Grenoble Alpes, CNRS, LIGVerified email at univ-grenoble-alpes.fr