All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |
G
Linking Objects in Videos by Importance Sampling, and , Idiap-RR-20-2002 |
|
Probabilistic Home Video Structuring: Feature Selection and Performance Evaluation, , and , in: IEEE International Conference on Image Processing, 2002 |
|
Probabilistic Home Video Structuring: Feature Selection and Performance Evaluation, , and , Idiap-RR-11-2002 |
|
Assessing Scene Structuring in Consumer Videos, , , , and , in: Int. Conf. on Image and Video Retrieval (CIVR), 2004 |
|
Assessing Scene Structuring in Consumer Videos, , , , and , Idiap-RR-11-2004 |
|
Modeling Interactions from Email Communication, , and , in: Proc. IEEE International Conference on Multimedia & Expo (ICME,',','), 2006, 2006 |
|
Extracting Information from Multimedia Meeting Collections, , and , in: 7th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2005 |
|
Extracting Information from Multimedia Meeting Collections, , and , Idiap-RR-50-2005 |
|
Speech Recognition based on Template Matching and Phone Posterior Probabilities, , and , Idiap-Com-02-2007 |
|
Comparison of Two Methods for Unsupervised Person Identification in TV Shows, , , , and , in: 12th International Workshop on Content-Based Multimedia Indexing, 2014 |
|
A Conditional Random field approach for audio-visual people diarization, , , , and , in: Proceedings of the 39th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 116 - 120, IEEE, 2014 |
[DOI] |
Face identification from overlaid texts using Local Face Recurrent Patterns and CRF models, , , , and , in: IEEE International Conference on Image Processing 2014, Paris, IEEE, 2014 |
|
CRF-Based Context Modeling for Person Identification in Broadcast Videos, , , and , in: Frontiers in ICT: Computer Image Analysis, 3, 2016 |
|
SWEET - An Open Source Modular Platform for Contactless Hand Vascular Biometric Experiments, , , , and , in: arXiv, 2024 |
[DOI] [URL] |
Reconnaissance et Transformation de Locuteurs, , École Polytechnique Fédérale de Lausanne, 1999 |
|
Combining methods to improve speaker verification decision, , , and , in: Proceedings of The Fourth International Conference on Spoken Language Processing, ICSLP, ICSLP, 1996 |
|
1997 NIST Evaluation: Text independent speaker detection (verification), and , Idiap-Com-03-1997 |
|
Deliberate Imposture: a challenge for automatic speaker verification systems, and , in: Proceedings of the European Conference on Speech Communication and Technology, 1999 |
Speech pre-processing against intentional imposture in speaker recognition, and , in: Proceedings of ICSLP, Sidney, 1998 |
Voice transformation, a tool for imposture of speaker verification, and , in: Proceedings of International Phonetic Science conference IPS98, Washington, 1998 |
Combining methods to improve speaker verification decision, , , and , Idiap-RR-02-1996 |
|
Amelioration des performances de verification du locuteur par combinaison de methodes, , , and , in: Journees d'etudes sur la parole, JEP, 1996 |
Polycost Database, , and , 1996 |
Text dependent speaker verification using binary classifiers, , and , in: Proceedings of the 1998 IEEE International Conference on Acoustics, Speech, and Signal Processing --- ICASSP'98, IEEE, IEEE, 1998 |
|
Text dependent speaker verification using binary classifiers, , and , Idiap-RR-08-1997 |
|
Towards Smart Pruning: ViNet, a Deep-Learning Approach for Grapevine Structure Estimation, , , and , in: Computers and Electronics in Agriculture, 207:107736, 2023 |
[DOI] [URL] |
Efficient Grapevine Structure Estimation in Vineyards Conditions, , , and , in: Proceedings of the IEEE/CVF International Conference on Computer Vision, Paris, pages 712--720, 2023 |
[URL] |
EdgeFace: Efficient Face Recognition Model for Edge Devices, , , , and , Idiap-RR-01-2024 |
|
EdgeFace : Efficient Face Recognition Model for Edge Devices, , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024 |
|
EFaR 2023: Efficient Face Recognition Competition, , , , and , in: IEEE International Joint Conference on Biometrics (IJCB 2023), 2023 |
|
A Comprehensive Evaluation on Multi-channel Biometric Face Presentation Attack Detection, , and , Idiap-RR-02-2022 |
|
Heterogeneous Face Recognition Using Domain Invariant Units, and , in: IEEE International Conference on Acoustics, Speech and Signal Processing, 2024 |
|
From Modalities to Styles: Rethinking the Domain Gap in Heterogeneous Face Recognition, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024 |
|
Modality Agnostic Heterogeneous Face Recognition with Switch Style Modulators, and , in: IEEE International Joint Conference on Biometrics, 2024 |
|
Bridging the Gap: Heterogeneous Face Recognition with Conditional Adaptive Instance Modulation, and , Idiap-RR-09-2023 |
|
Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection, and , Idiap-RR-08-2023 |
|
Bridging the Gap: Heterogeneous Face Recognition with Conditional Adaptive Instance Modulation, and , in: IJCB, 2023 |
|
The Unconstrained Ear Recognition Challenge 2023: Maximizing Performance and Minimizing Bias, and , in: IEEE International Joint Conference on Biometrics (IJCB 2023), 2023 |
|
Attacking Face Recognition with T-shirts: Database, Vulnerability Assessment and Detection, and , in: IEEE Access, 2023 |
|
Robust Face Presentation Attack Detection with Multi-channel Neural Networks, and , in: Handbook of Biometric Anti-Spoofing, Springer, 2023 |
|
Robust Face Presentation Attack Detection with Multi-channel Neural Networks, and , Idiap-RR-03-2022 |
|
Cross Modal Focal Loss for RGBD Face Anti-Spoofing, and , in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2021 |
|
On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing, and , in: International Joint Conference on Biometrics (IJCB 2021), 2021 |
|
Multi-channel Face Presentation Attack Detection Using Deep Learning, and , in: Deep Learning-Based Face Analytics, Springer International Publishing, 2021 |
|
Learning One Class Representations for Presentation Attack Detection using Multi-channel Convolutional Neural Networks, and , Idiap-RR-15-2020 |
|
Can Your Face Detector Do Anti-spoofing? Face Presentation Attack Detection with a Multi-Channel Face Detector, and , Idiap-RR-12-2020 |
|
Learning One Class Representations for Face Presentation Attack Detection using Multi-channel Convolutional Neural Networks, and , in: IEEE Transactions on Information Forensics and Security, 2020 |
|
On the Effectiveness of Vision Transformers for Zero-shot Face Anti-Spoofing, and , Idiap-RR-30-2020 |
|
Deep Pixel-wise Binary Supervision for Face Presentation Attack Detection, and , in: International Conference on Biometrics, 2019 |
|
Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles, , and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |