All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |
C
Text Identification in Complex Background using SVM, , and , in: Proceedings of the Int. Conf. on computer vision and pattern recognition, 2001 |
Text Identification in Complex Background using SVM, , and , Idiap-RR-20-2001 |
|
A Survey of Text Detection and Recognition in Images and Videos, and , Idiap-RR-38-2000 |
|
Multiple Hypotheses Video OCR, and , in: Proceedings of the 4th International Workshop on Document Analysis System, 2000 |
|
Multiple Hypotheses Video OCR, and , Idiap-RR-28-2000 |
|
Video Text Recognition using Sequential Monte Carlo and Error Voting Methods, and , in: Pattern Recognition Letters, 26(9), 2005 |
|
Monte Carlo Video Text Segmentation, and , Idiap-RR-07-2003 |
|
Sequential Monte Carlo Video Text Segmentation, and , in: ICIP, 2003 |
|
Video Text Segmentation Using Particle Filters, and , Idiap-RR-43-2003 |
|
A Localization/Verification Scheme for Finding Text in Images and Video Frames Based on Contrast Independent Features and Machine Learning Methods, and , Idiap-RR-42-2003 |
|
A New Method of Contrast Normalization for Verification of Extracted Video Text Having Complex Backgrounds, and , Idiap-RR-16-2002 |
|
Comparison of Support Vector Machine and Neural Network for Text Texture Verification, and , Idiap-RR-19-2002 |
|
Text Detection and Recognition in Images and Videos, , and , in: Pattern Recognition, 37(3), 2004 |
Text Detection and Recognition in Images and Videos, , and , Idiap-RR-61-2002 |
|
Text Segmentation and Recognition in Complex Background Based on Markov Random Field, , and , in: Int. Conf. Pattern Recognition 2002, 2002 |
|
Text Segmentation and Recognition in Complex Background Based on Markov Random Field, , and , Idiap-RR-17-2002 |
|
Monte Carlo Video Text Segmentation, , and , in: International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 19(5), 2005 |
|
A Localization/Verification Scheme for Finding Text in Images and Video Frames Based on Contrast Independent Features and Machine Learning Methods, , and , in: Signal Processing: Image Communication, 19(3), 2004 |
|
ASYMMETRIC FILTER FOR TEXT RECOGNITION IN VIDEO, and , Idiap-RR-37-2000 |
|
Text Enhancement with Asymmetric Filter for Video OCR, , and , in: Proceedings of the 11th International Conference on Image Analysis and Processing, 2001 |
|
Video OCR for Sport Video Annotation and Retrieval, , and , in: Proceedings of the 8th IEEE International Conference on Mechatronics and Machine Vision in Practice, 2001 |
|
Text Enhancement with Asymmetric Filter for Video OCR, , and , Idiap-RR-19-2001 |
|
A Bayesian Interpretation of Adaptive Low-Rank Adaptation, and , in: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2025 |
Bayesian Parameter-Efficient Fine-Tuning for Overcoming Catastrophic Forgetting, and , in: IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2024 |
[DOI] |
Diffusion Transformer for Adaptive Text-to-Speech, and , in: Proc. 12th ISCA Speech Synthesis Workshop (SSW 12), 2023 |
[DOI] |
The Idiap Speech Synthesis System for the Blizzard Challenge 2023, , , and , in: Proc. 18th Blizzard Challenge Workshop, 2023 |
[DOI] |
Dynamical Dirichlet Mixture Model, , and , Idiap-RR-02-2007 |
|
Head Nod Detection from a Full 3D Model, , and , in: Proceedings of the ICCV 2015, pages 528-536, 2015 |
|
A Generalized Dynamic Composition Algorithm of Weighted Finite State Transducers for Large Vocabulary Speech Recognition, , and , Idiap-RR-62-2006 |
|
Analysis and Classification of EEG Signals using Probabilistic Models for Brain Computer Interfaces, , École Polytechnique Fédérale de Lausanne, 2006 |
[DOI] [URL] |
Analysis and Classification of EEG Signals using Probabilistic Models for Brain Computer Interfaces, , Idiap-RR-48-2006 |
[URL] |
Bayesian Factorial Linear Gaussian State-Space Models for Biosignal Decomposition, and , in: IEEE Signal Processing Letters, 2007 |
|
EEG Classification using Generative Independent Component Analysis, and , in: Neurocomputing, 2006 |
|
Generative Independent Component Analysis for EEG Classification, and , in: European Symposium on Artificial Neural Networks ESANN, 2005 |
|
Generative Temporal ICA for Classification in Asynchronous BCI Systems, and , Idiap-RR-08-2005 |
|
Generative Temporal ICA for Classification in Asynchronous BCI Systems, and , in: The 2nd International IEEE EMBS Conference On Neural Engineering, 2005 |
|
Bayesian Factorial Linear Gaussian State-Space Models for Biosignal Decomposition, and , Idiap-RR-84-2005 |
|
EEG Classification using Generative Independent Component Analysis, and , Idiap-RR-77-2004 |
|
HMM and IOHMM Modeling of EEG Rhythms for Asynchronous BCI Systems, and , in: European Symposium on Artificial Neural Networks ESANN, 2004 |
|
Sequence Classification with Input-Output Hidden Markov Models, and , Idiap-RR-13-2004 |
Nonlinear Analysis of Cognitive and Motor-related EEG Signals, and , Idiap-RR-14-2003 |
HMM and IOHMM Modeling of EEG Rhythms for Asynchronous BCI Systems, and , Idiap-RR-49-2003 |
|
EEG-based BCI Systems and IDIAP EEG Database, and , Idiap-RR-64-2003 |
|
Trustworthy Biometric Verification under Spoofing Attacks: Application to the Face Mode, , École Polytechnique Fédérale de Lausanne, 2015 |
[URL] |
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |