All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 |
C
Diffusion transformer for adaptive text-to-speech, and , in: Proc. 12th ISCA Speech Synthesis Workshop (SSW 12), 2023 |
![]() [DOI] |
The Idiap Speech Synthesis System for the Blizzard Challenge 2023, , , and , in: Proc. 18th Blizzard Challenge Workshop, 2023 |
![]() [DOI] |
Dynamical Dirichlet Mixture Model, , and , Idiap-RR-02-2007 |
![]() |
Head Nod Detection from a Full 3D Model, , and , in: Proceedings of the ICCV 2015, pages 528-536, 2015 |
![]() |
A Generalized Dynamic Composition Algorithm of Weighted Finite State Transducers for Large Vocabulary Speech Recognition, , and , Idiap-RR-62-2006 |
![]() |
Analysis and Classification of EEG Signals using Probabilistic Models for Brain Computer Interfaces, , École Polytechnique Fédérale de Lausanne, 2006 |
[DOI] [URL] |
Analysis and Classification of EEG Signals using Probabilistic Models for Brain Computer Interfaces, , Idiap-RR-48-2006 |
[URL] |
Bayesian Factorial Linear Gaussian State-Space Models for Biosignal Decomposition, and , in: IEEE Signal Processing Letters, 2007 |
![]() |
EEG Classification using Generative Independent Component Analysis, and , in: Neurocomputing, 2006 |
![]() |
Generative Independent Component Analysis for EEG Classification, and , in: European Symposium on Artificial Neural Networks ESANN, 2005 |
![]() |
Generative Temporal ICA for Classification in Asynchronous BCI Systems, and , Idiap-RR-08-2005 |
![]() |
Generative Temporal ICA for Classification in Asynchronous BCI Systems, and , in: The 2nd International IEEE EMBS Conference On Neural Engineering, 2005 |
![]() |
Bayesian Factorial Linear Gaussian State-Space Models for Biosignal Decomposition, and , Idiap-RR-84-2005 |
![]() |
EEG Classification using Generative Independent Component Analysis, and , Idiap-RR-77-2004 |
![]() |
HMM and IOHMM Modeling of EEG Rhythms for Asynchronous BCI Systems, and , in: European Symposium on Artificial Neural Networks ESANN, 2004 |
![]() |
Sequence Classification with Input-Output Hidden Markov Models, and , Idiap-RR-13-2004 |
Nonlinear Analysis of Cognitive and Motor-related EEG Signals, and , Idiap-RR-14-2003 |
HMM and IOHMM Modeling of EEG Rhythms for Asynchronous BCI Systems, and , Idiap-RR-49-2003 |
![]() |
EEG-based BCI Systems and IDIAP EEG Database, and , Idiap-RR-64-2003 |
![]() |
Trustworthy Biometric Verification under Spoofing Attacks: Application to the Face Mode, , École Polytechnique Fédérale de Lausanne, 2015 |
![]() [URL] |
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
![]() |
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
![]() |
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
![]() [DOI] |
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
![]() |
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
![]() |
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
![]() |
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
![]() |
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
![]() |
Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Face Recognition Systems Under Spoofing Attacks, , , and , Idiap-RR-18-2020 |
![]() |
Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
![]() [DOI] [URL] |
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
![]() |
Exploiting observers' judgements for nonverbal group interaction analysis, , and , in: IEEE Conference on Automatic Face and Gesture Recognition, pages 6, IEEE, 2011 |
![]() |
Inferring truth from multiple annotators for social interaction analysis, , and , in: Neural Information Processing Systems (NIPS) Workshop on Modeling Human Communication Dynamics (HCD), pages 4, 2011 |
![]() |
Who's Who with Big-Five: Analyzing and Classifying Personality Traits with Smartphones, , and , in: International Symposium on Wearable Computing, pages 8, 2011 |
![]() |
Mining Large-Scale Smartphone Data for Personality Studies, , and , in: Personal and Ubiquitous Computing, 2012 |
![]() |
Are you a Werewolf? Detecting deceptive roles and outcomes in a conversational role-playing game, and , in: IEEE International Conference on Acoustics, Speech and Signal Processing, 2010 |
![]() |
Multichannel signal separation for cocktail party speech recognition: a dynamic recurrent network, , , and , in: Int. Conf. on Spoken Language Processing (ICSLP), no IDIAP RR, see RESPITE www, 2000 |
Blind separation of delayed and superimposed acoustic sources : learning algorithms an experimental study, , , , and , in: Proc. IEEE Int. Conference on Speech Processing (ICSP), IEEE, 1999 |
Les domaines d'application des technologies vocales, , in: Fondements et perspectives en traitement automatique de la parole, GDR-PRC Communication Homme-Machine, 1995 |
Assessment of speaker verification systems, and , in: Spoken Language Ressources and Assessment, EAGLES Handbook, 1995 |
Swiss French PolyPhone and PolyVar: telephone speech databases to model inter- and intra-speaker variability, , , , and , Idiap-RR-01-1996 |
![]() |
Swiss-French Polyphone: a Telephone Speech Database to develop Interactive Voice Servers, , , and , in: Linguistic Databases, 1995 |
Discrimination of the voices of twins and siblings for speaker verification, and , in: 4th European Conference on Speech Communication and Technology, 1995 |
Neural nets approaches to Speaker Verification: comparison with Second Order Statistical Measure, and , in: ICASSP, 1995 |
A study of Intra- and Inter-Speaker Variability in the Voices of Twins for Speaker Verification, and , in: International Congress of Phonetic Sciences, 1995 |
Automatic Word Recognition in Cars, and , in: IEEE Speech and Audio Processing, 1995 |
Towards energy hubs: an innovative Geographic Information System based approach for cluster definition, , , and , in: ICREC 2022 Conference Proceedings, 2022 |
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 |