All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 |
C
A Generalized Dynamic Composition Algorithm of Weighted Finite State Transducers for Large Vocabulary Speech Recognition, , and , Idiap-RR-62-2006 |
|
Analysis and Classification of EEG Signals using Probabilistic Models for Brain Computer Interfaces, , École Polytechnique Fédérale de Lausanne, 2006 |
[DOI] [URL] |
Analysis and Classification of EEG Signals using Probabilistic Models for Brain Computer Interfaces, , Idiap-RR-48-2006 |
[URL] |
Bayesian Factorial Linear Gaussian State-Space Models for Biosignal Decomposition, and , in: IEEE Signal Processing Letters, 2007 |
|
EEG Classification using Generative Independent Component Analysis, and , in: Neurocomputing, 2006 |
|
Generative Independent Component Analysis for EEG Classification, and , in: European Symposium on Artificial Neural Networks ESANN, 2005 |
|
Generative Temporal ICA for Classification in Asynchronous BCI Systems, and , Idiap-RR-08-2005 |
|
Generative Temporal ICA for Classification in Asynchronous BCI Systems, and , in: The 2nd International IEEE EMBS Conference On Neural Engineering, 2005 |
|
Bayesian Factorial Linear Gaussian State-Space Models for Biosignal Decomposition, and , Idiap-RR-84-2005 |
|
EEG Classification using Generative Independent Component Analysis, and , Idiap-RR-77-2004 |
|
HMM and IOHMM Modeling of EEG Rhythms for Asynchronous BCI Systems, and , in: European Symposium on Artificial Neural Networks ESANN, 2004 |
|
Sequence Classification with Input-Output Hidden Markov Models, and , Idiap-RR-13-2004 |
Nonlinear Analysis of Cognitive and Motor-related EEG Signals, and , Idiap-RR-14-2003 |
HMM and IOHMM Modeling of EEG Rhythms for Asynchronous BCI Systems, and , Idiap-RR-49-2003 |
|
EEG-based BCI Systems and IDIAP EEG Database, and , Idiap-RR-64-2003 |
|
Trustworthy Biometric Verification under Spoofing Attacks: Application to the Face Mode, , École Polytechnique Fédérale de Lausanne, 2015 |
[URL] |
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|
Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Face Recognition Systems Under Spoofing Attacks, , , and , Idiap-RR-18-2020 |
|
Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
Exploiting observers' judgements for nonverbal group interaction analysis, , and , in: IEEE Conference on Automatic Face and Gesture Recognition, pages 6, IEEE, 2011 |
|
Inferring truth from multiple annotators for social interaction analysis, , and , in: Neural Information Processing Systems (NIPS) Workshop on Modeling Human Communication Dynamics (HCD), pages 4, 2011 |
|
Who's Who with Big-Five: Analyzing and Classifying Personality Traits with Smartphones, , and , in: International Symposium on Wearable Computing, pages 8, 2011 |
|
Mining Large-Scale Smartphone Data for Personality Studies, , and , in: Personal and Ubiquitous Computing, 2012 |
|
Are you a Werewolf? Detecting deceptive roles and outcomes in a conversational role-playing game, and , in: IEEE International Conference on Acoustics, Speech and Signal Processing, 2010 |
|
Multichannel signal separation for cocktail party speech recognition: a dynamic recurrent network, , , and , in: Int. Conf. on Spoken Language Processing (ICSLP), no IDIAP RR, see RESPITE www, 2000 |
Blind separation of delayed and superimposed acoustic sources : learning algorithms an experimental study, , , , and , in: Proc. IEEE Int. Conference on Speech Processing (ICSP), IEEE, 1999 |
Les domaines d'application des technologies vocales, , in: Fondements et perspectives en traitement automatique de la parole, GDR-PRC Communication Homme-Machine, 1995 |
Assessment of speaker verification systems, and , in: Spoken Language Ressources and Assessment, EAGLES Handbook, 1995 |
Swiss French PolyPhone and PolyVar: telephone speech databases to model inter- and intra-speaker variability, , , , and , Idiap-RR-01-1996 |
|
Swiss-French Polyphone: a Telephone Speech Database to develop Interactive Voice Servers, , , and , in: Linguistic Databases, 1995 |
Discrimination of the voices of twins and siblings for speaker verification, and , in: 4th European Conference on Speech Communication and Technology, 1995 |
Neural nets approaches to Speaker Verification: comparison with Second Order Statistical Measure, and , in: ICASSP, 1995 |
A study of Intra- and Inter-Speaker Variability in the Voices of Twins for Speaker Verification, and , in: International Congress of Phonetic Sciences, 1995 |
Automatic Word Recognition in Cars, and , in: IEEE Speech and Audio Processing, 1995 |
Towards energy hubs: an innovative Geographic Information System based approach for cluster definition, , , and , in: ICREC 2022 Conference Proceedings, 2022 |
Vibrotactile Feedback for Brain-Computer Interface Operation, , , , , , , , , , , and , in: Computational Intelligence and Neuroscience, 2007, 2007 |
|
Vibrotactile Feedback in the Context of Mu-Rhythm based BCI, , , , , , , , , , , and , in: Proceedings of the 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2007 |
|
High-Resolution EEG Techniques for Brain-Computer Interface Applications, , , , , , , , , , , and , in: Journal of Neuroscience Methods, 2007 |
|
Comparison of different feature classifiers for brain computer interfaces, , , , , , , , and , in: Proceedings of the 1st International IEEE EMBS Conference on Neural Engineering, 2003 |
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 |