All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |
C
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|
Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
Face Recognition Systems Under Spoofing Attacks, , , and , Idiap-RR-18-2020 |
|
Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
Exploiting observers' judgements for nonverbal group interaction analysis, , and , in: IEEE Conference on Automatic Face and Gesture Recognition, pages 6, IEEE, 2011 |
|
Inferring truth from multiple annotators for social interaction analysis, , and , in: Neural Information Processing Systems (NIPS) Workshop on Modeling Human Communication Dynamics (HCD), pages 4, 2011 |
|
Who's Who with Big-Five: Analyzing and Classifying Personality Traits with Smartphones, , and , in: International Symposium on Wearable Computing, pages 8, 2011 |
|
Mining Large-Scale Smartphone Data for Personality Studies, , and , in: Personal and Ubiquitous Computing, 2012 |
|
Are you a Werewolf? Detecting deceptive roles and outcomes in a conversational role-playing game, and , in: IEEE International Conference on Acoustics, Speech and Signal Processing, 2010 |
|
Multichannel signal separation for cocktail party speech recognition: a dynamic recurrent network, , , and , in: Int. Conf. on Spoken Language Processing (ICSLP), no IDIAP RR, see RESPITE www, 2000 |
Blind separation of delayed and superimposed acoustic sources : learning algorithms an experimental study, , , , and , in: Proc. IEEE Int. Conference on Speech Processing (ICSP), IEEE, 1999 |
Les domaines d'application des technologies vocales, , in: Fondements et perspectives en traitement automatique de la parole, GDR-PRC Communication Homme-Machine, 1995 |
Assessment of speaker verification systems, and , in: Spoken Language Ressources and Assessment, EAGLES Handbook, 1995 |
Swiss French PolyPhone and PolyVar: telephone speech databases to model inter- and intra-speaker variability, , , , and , Idiap-RR-01-1996 |
|
Swiss-French Polyphone: a Telephone Speech Database to develop Interactive Voice Servers, , , and , in: Linguistic Databases, 1995 |
Discrimination of the voices of twins and siblings for speaker verification, and , in: 4th European Conference on Speech Communication and Technology, 1995 |
Neural nets approaches to Speaker Verification: comparison with Second Order Statistical Measure, and , in: ICASSP, 1995 |
A study of Intra- and Inter-Speaker Variability in the Voices of Twins for Speaker Verification, and , in: International Congress of Phonetic Sciences, 1995 |
Automatic Word Recognition in Cars, and , in: IEEE Speech and Audio Processing, 1995 |
Towards energy hubs: an innovative Geographic Information System based approach for cluster definition, , , and , in: ICREC 2022 Conference Proceedings, 2022 |
Vibrotactile Feedback for Brain-Computer Interface Operation, , , , , , , , , , , and , in: Computational Intelligence and Neuroscience, 2007, 2007 |
|
Vibrotactile Feedback in the Context of Mu-Rhythm based BCI, , , , , , , , , , , and , in: Proceedings of the 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2007 |
|
High-Resolution EEG Techniques for Brain-Computer Interface Applications, , , , , , , , , , , and , in: Journal of Neuroscience Methods, 2007 |
|
Comparison of different feature classifiers for brain computer interfaces, , , , , , , , and , in: Proceedings of the 1st International IEEE EMBS Conference on Neural Engineering, 2003 |
Un interface d'indexation documentaire: I d'i, version 1.4, , Idiap-RR-01-1993 |
|
Un interface d'indexation documentaire: I d'i, version 2.0, , Idiap-RR-03-1993 |
|
Un interface de recherche documentaire: I de r, version 2.0, , Idiap-RR-04-1993 |
|
Un environnement d'analyse linguistique robuste: CPD, version 1.7, , Idiap-RR-03-1992 |
|
Une technique efficace de traitement en Prolog de la morphologie flexionnelle du français, , Idiap-RR-04-1992 |
|
Environnement multi-agents de reconnaissance automatique de la parole en continu, and , in: Actes des 3emes Journees Francophones sur l'Intelligence Artificielle Distribuee et les Systemes Multi-agents, 1995 |
A graphical tool for monitoring Oz objects activity, and , in: Proc. of WOz'95: International Workshop on Oz Programming, IDIAP, Uni. Fribourg, 1995 |
Reliability in a Multi-agent Spoken Language Recognition System, and , in: 4th European Conference on Speech Communication and Technology, 1995 |
ETC\_vérif : un environnement multi-agents de reconnaissance automatique de la parole en continu, and , in: Proceedings of JEP'96: XXIemes Journees d'etude sur la Parole, 1996 |
|
ETC\_vérif, a Prototype of a Cooperative Automatic Speech Recognition System, and , in: Proc. of WOz'95: International Workshop on Oz Programming, IDIAP, Uni. Fribourg, 1995 |
On the use of automatically generated synthetic image datasets for benchmarking face recognition, , and , in: International Joint Conference on Biometrics (IJCB 2021), 2021 |
|
Evaluating the Effectiveness of Attack-Agnostic Features for Morphing Attack Detection, and , in: International Joint Conference on Biometrics, 2024 |
|
On the detection of morphing attacks generated by GANs, and , Idiap-RR-07-2022 |
|
On the detection of morphing attacks generated by GANs, and , in: 21st International Conference of the Biometrics Special Interest Group (BIOSIG 2022), 2022 |
|
Approximating Optimal Morphing Attacks using Template Inversion, , and , in: IEEE International Joint Conference on Biometric, 2023 |
[DOI] |
Approximating Optimal Morphing Attacks using Template Inversion, , and , Idiap-RR-07-2023 |
|
Developement d'un systeme de demande interactif via le telephone (INFOVOX), , Idiap-Com-08-2001 |
|
Deep Learning for Efficient Discriminative Parsing, , in: International Conference on Artificial Intelligence and Statistics, 2011 |
|
Large Scale Machine Learning, , Université de Paris VI, 2004 |
|
Large Scale Machine Learning, , Idiap-RR-42-2004 |
|
Support Vector Machines, Théorie et Application, , Idiap-Com-03-2000 |
|
A Gentle Hessian for Efficient Gradient Descent, and , in: IEEE International Conference on Acoustic, Speech, and Signal Processing, ICASSP, 2004 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |