All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 |
C
| Head Nod Detection from a Full 3D Model, , and , in: Proceedings of the ICCV 2015, pages 528-536, 2015 |
|
| A Generalized Dynamic Composition Algorithm of Weighted Finite State Transducers for Large Vocabulary Speech Recognition, , and , Idiap-RR-62-2006 |
|
| Specializing General-purpose LLM Embeddings for Implicit Hate Speech Detection across Datasets, , , , and , in: Proceedings of the 2nd International Workshop on Diffusion of Harmful Content on Online Web (DHOW '25), October 27--28, 2025, Dublin, Ireland, 2025 |
|
| Efficient and Real-Time Motion Planning for Robotics Using Projection-Based Optimization, , , , , , , and , in: Proc. IEEE/RSJ Intl Conf. on Intelligent Robots and Systems (IROS), 2025 |
| Analysis and Classification of EEG Signals using Probabilistic Models for Brain Computer Interfaces, , École Polytechnique Fédérale de Lausanne, 2006 |
[DOI] [URL] |
| Analysis and Classification of EEG Signals using Probabilistic Models for Brain Computer Interfaces, , Idiap-RR-48-2006 |
[URL] |
| Bayesian Factorial Linear Gaussian State-Space Models for Biosignal Decomposition, and , in: IEEE Signal Processing Letters, 2007 |
|
| EEG Classification using Generative Independent Component Analysis, and , in: Neurocomputing, 2006 |
|
| Generative Independent Component Analysis for EEG Classification, and , in: European Symposium on Artificial Neural Networks ESANN, 2005 |
|
| Generative Temporal ICA for Classification in Asynchronous BCI Systems, and , Idiap-RR-08-2005 |
|
| Generative Temporal ICA for Classification in Asynchronous BCI Systems, and , in: The 2nd International IEEE EMBS Conference On Neural Engineering, 2005 |
|
| Bayesian Factorial Linear Gaussian State-Space Models for Biosignal Decomposition, and , Idiap-RR-84-2005 |
|
| EEG Classification using Generative Independent Component Analysis, and , Idiap-RR-77-2004 |
|
| HMM and IOHMM Modeling of EEG Rhythms for Asynchronous BCI Systems, and , in: European Symposium on Artificial Neural Networks ESANN, 2004 |
|
| Sequence Classification with Input-Output Hidden Markov Models, and , Idiap-RR-13-2004 |
| Nonlinear Analysis of Cognitive and Motor-related EEG Signals, and , Idiap-RR-14-2003 |
| HMM and IOHMM Modeling of EEG Rhythms for Asynchronous BCI Systems, and , Idiap-RR-49-2003 |
|
| EEG-based BCI Systems and IDIAP EEG Database, and , Idiap-RR-64-2003 |
|
| Trustworthy Biometric Verification under Spoofing Attacks: Application to the Face Mode, , École Polytechnique Fédérale de Lausanne, 2015 |
[URL] |
| On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
| Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
| Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
| Anti-spoofing in action: joint operation with a verification system, , and , Idiap-RR-19-2013 |
|
| The 2nd Competition on Counter Measures to 2D Face Spoofing Attacks, , and , Idiap-RR-18-2013 |
|
| Anti-spoofing in action: joint operation with a verification system, , and , in: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Workshop on Biometrics, Portland, Oregon, 2013 |
|
| On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , Idiap-RR-19-2012 |
|
| On the Effectiveness of Local Binary Patterns in Face Anti-spoofing, , and , in: Proceedings of the 11th International Conference of the Biometrics Special Interes Group, 2012 |
|
| Evaluation Methodologies, , and , in: Handbook of Biometric Antispoofing, Springer, 2014 |
| Anti-spoofing: Evaluation Methodologies, , and , in: Encyclopedia of Biometrics, Springer US, 2014 |
[DOI] |
| Face Recognition Systems Under Spoofing Attacks, , , and , Idiap-RR-18-2020 |
|
| Face Recognition Systems Under Spoofing Attacks, , , and , in: Face Recognition Systems Under Spoofing Attacks, pages 165-194, Springer International Publishing, 2016 |
[DOI] [URL] |
| Evaluation Methodologies for Biometric Presentation Attack Detection, , , and , in: Handbook of Biometric Anti-Spoofing, Springer International Publishing, 2019 |
[DOI] [URL] |
| The 2nd competition on counter measures to 2D face spoofing attacks, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and , in: International Conference of Biometrics 2013, Madrid, Spain, 2013 |
|
| Exploiting observers' judgements for nonverbal group interaction analysis, , and , in: IEEE Conference on Automatic Face and Gesture Recognition, pages 6, IEEE, 2011 |
|
| Inferring truth from multiple annotators for social interaction analysis, , and , in: Neural Information Processing Systems (NIPS) Workshop on Modeling Human Communication Dynamics (HCD), pages 4, 2011 |
|
| Who's Who with Big-Five: Analyzing and Classifying Personality Traits with Smartphones, , and , in: International Symposium on Wearable Computing, pages 8, 2011 |
|
| Mining Large-Scale Smartphone Data for Personality Studies, , and , in: Personal and Ubiquitous Computing, 2012 |
|
| Are you a Werewolf? Detecting deceptive roles and outcomes in a conversational role-playing game, and , in: IEEE International Conference on Acoustics, Speech and Signal Processing, 2010 |
|
| Multichannel signal separation for cocktail party speech recognition: a dynamic recurrent network, , , and , in: Int. Conf. on Spoken Language Processing (ICSLP), no IDIAP RR, see RESPITE www, 2000 |
| Blind separation of delayed and superimposed acoustic sources : learning algorithms an experimental study, , , , and , in: Proc. IEEE Int. Conference on Speech Processing (ICSP), IEEE, 1999 |
| Les domaines d'application des technologies vocales, , in: Fondements et perspectives en traitement automatique de la parole, GDR-PRC Communication Homme-Machine, 1995 |
| Assessment of speaker verification systems, and , in: Spoken Language Ressources and Assessment, EAGLES Handbook, 1995 |
| Swiss French PolyPhone and PolyVar: telephone speech databases to model inter- and intra-speaker variability, , , , and , Idiap-RR-01-1996 |
|
| Swiss-French Polyphone: a Telephone Speech Database to develop Interactive Voice Servers, , , and , in: Linguistic Databases, 1995 |
| Discrimination of the voices of twins and siblings for speaker verification, and , in: 4th European Conference on Speech Communication and Technology, 1995 |
| Neural nets approaches to Speaker Verification: comparison with Second Order Statistical Measure, and , in: ICASSP, 1995 |
| A study of Intra- and Inter-Speaker Variability in the Voices of Twins for Speaker Verification, and , in: International Congress of Phonetic Sciences, 1995 |
| Automatic Word Recognition in Cars, and , in: IEEE Speech and Audio Processing, 1995 |
| Towards energy hubs: an innovative Geographic Information System based approach for cluster definition, , , and , in: ICREC 2022 Conference Proceedings, 2022 |
| Vibrotactile Feedback for Brain-Computer Interface Operation, , , , , , , , , , , and , in: Computational Intelligence and Neuroscience, 2007, 2007 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | 84 | 85 | 86 |