All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 |
K
CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR, and , in: IEEE International Conference on Image Processing, 2020 |
|
Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science:11, 2019 |
|
Une application de reconnaissance du locuteur : \\ le User-Customized Password Speaker Verification, , Idiap-Com-04-2004 |
|
A Savitzky-Golay Filtering Perspective of Dynamic Feature Computation, , and , in: IEEE Signal Processing Letters, 20(3):281 -- 284, 2013 |
[DOI] |
Global Optimization with Sparse and Local Gaussian Process Models, and , in: Machine Learning, Optimization, and Big Data, pages 185-196, Springer International Publishing, 2015 |
[DOI] |
Exploring Human Biometrics: A Focus on Security Concerns and Deep Neural Networks, , in: APSIPA Transactions on Signal and Information Processing, 2023 |
[DOI] [URL] |
Towards Measuring the Amount of Discriminatory Information in Finger Vein Biometric Characteristics Using a Relative Entropy Estimator, , , , and , in: Handbook of Vascular Biometrics, pages 507-525, Springer Open, 2019 |
|
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: arXiv, 2022 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 4(1):117-134, 2022 |
[DOI] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2021 |
[URL] |
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: arXiv, 2021 |
[URL] |
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: arXiv, 2021 |
[URL] |
Towards Quantifying the Entropy of Fingervein Patterns across Different Feature Extractors, and , in: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018 |
|
On the Recognition Performance of BioHash-Protected Finger Vein Templates, and , in: Handbook of Vascular Biometrics, pages 465-480, Springer Open, 2019 |
|
EPFL lab session 1/2: Introduction to Gaussian statistics and pattern recognition, , Idiap-Com-06-2001 |
|
EPFL lab session 2/2: Introduction to Hidden Markov Models, , Idiap-Com-07-2001 |
|
PhD Thesis: Speech Analysis with Production Constraints, , École Polytechnique Fédérale de Lausanne, 2001 |
|
PhD Thesis: Speech Analysis with Production Constraints, , Idiap-RR-35-2001 |
|
LPC modeling with speech production constraints, , in: Proc. 5th Speech Production Seminar, 2000 |
|
Relating LPC modeling to a factor-based articulatory model, , in: Proc. ICSLP 2000, 2000 |
|
LPC-based inversion of the DRM articulatory model, , in: Proc. Eurospeech'99, 1999 |
|
Acoustico-articulatory inversion of unequal-length tube models through lattice inverse filtering, , Idiap-RR-16-1998 |
|
Investigation of a possible process identity between DRM and Linear Filtering, , Idiap-RR-19-1997 |
|
Présentation du Modèle DRM, , Idiap-Com-03-1996 |
|
Signal modeling with Non Uniform Topology lattice filters, and , in: Proc. ICASSP 2001, 2001 |
|
Inverse lattice filtering of speech with adapted non-uniform delays, and , in: Proc. ICSLP 2000, 2000 |
|
On the Vulnerability of Speaker Verification to Realistic Voice Spoofing, , , and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, pages 1-8, IEEE, 2015 |
[DOI] [URL] |
Learning strategies and representations for intuitive robot learning from demonstration, , EPFL, 2021 |
|
Combining Social and Intrinsically-Motivated Learning for Multi-Task Robot Skill Acquisition, and , in: IEEE Transactions on Cognitive and Developmental Systems, 15(2):385-394, 2023 |
[DOI] |
Intrinsically-Motivated Robot Learning of Bayesian Probabilistic Movement Primitives, and , in: ICRA workshop: "Towards Curious Robots: Modern Approaches for Intrinsically-Motivated Intelligent Behavior", 2021 |
|
Active Learning of Bayesian Probabilistic Movement Primitives, , , and , in: IEEE Robotic and Automation Letters, 2021 |
|
Fourier movement primitives: an approach for learning rhythmic robot skills from demonstrations, , and , in: Robotics: Science and Systems, 2020 |
|
Modelling glottal source information for depression detection, , and , Idiap-RR-13-2018 |
|
Multitask Speech Recognition and Speaker Change Detection for Unknown Number of Speakers, , , , , , , and , in: Proceedings of the 49th IEEE International Conference on Acoustics, Speech, & Signal Processing (ICASSP) 2024, 2024 |
Minimum Mutual Information Beamforming for Simultaneous Active Speakers, , , , , and , Idiap-RR-73-2007 |
|
Adaptive Beamforming with a Minimum Mutual Information Criterion, , , , , and , Idiap-RR-74-2007 |
|
Adaptive Beamforming with a Maximum Negentropy Criterion, , , , and , Idiap-RR-06-2008 |
|
Maximum Negentropy Beamforming, , , , and , Idiap-RR-07-2008 |
|
Adaptive Beamforming with a Maximum Negentropy Criterion, , , , and , in: Proceedings of the Joint Workshop on Hands-free Speech Communication and Microphone Arrays, Italy, 2008 |
|
Adaptive Beamforming with a Maximum Negentropy Criterion, , , , , and , Idiap-RR-29-2008 |
|
Maximum kurtosis beamforming with the generalized sidelobe canceller, , , , , and , in: Proceedings of INTERSPEECH, September 2008, Brisbane, Australia, 2008 |
|
Beamforming with a Maximum Negentropy Criterion, , , , , and , in: IEEE Transactions on Audio Speech and Language Processing, 17(5), 2009 |
|
Filter Bank Design for Subband Adaptive Beamforming and Application to Speech Recognition, , , , , and , Idiap-RR-02-2008 |
|
Filter Bank Design based on Minimization of Individual Aliasing Terms for Minimum Mutual Information Subband Adaptive Beamforming, , , , , and , in: Proceedings of ICASSP 2008, Las Vegas, USA, 2008 |
|
Filter Bank Design based on Minimization of Individual Aliasing Terms for Minimum Mutual Information Subband Adaptive Beamforming, , , , , and , Idiap-RR-77-2007 |
|
Fast latent semantic indexing of spoken documents by using self-organizing maps, , in: Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP'2000, 2000 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 |