All publications sorted by author
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |
K
Cross-database evaluation of audio-based spoofing detection systems, and , Idiap-RR-23-2016 |
[URL] |
Cross-database evaluation of audio-based spoofing detection systems, and , in: Interspeech, San Francisco, USA, 2016 |
[URL] |
Joint Operation of Voice Biometrics and Presentation Attack Detection, and , Idiap-RR-25-2016 |
[URL] |
Joint Operation of Voice Biometrics and Presentation Attack Detection, and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, 2016 |
[URL] |
A Cross-database Study of Voice Presentation Attack Detection, and , in: Handbook of Biometric Anti-Spoofing: Presentation Attack Detection, 2nd Edition, Springer, 2018 |
Overview of BTAS 2016 Speaker Anti-spoofing Competition, , , , , , , , , , , , , , , and , in: IEEE International Conference on Biometrics: Theory, Applications and Systems, 2016 |
[URL] |
Overview of BTAS 2016 Speaker Anti-spoofing Competition, , , , , , , , , , , , , , , and , Idiap-RR-24-2016 |
[URL] |
Presentation attack detection in voice biometrics, and , in: User-Centric Privacy and Security in Biometrics, The Institution of Engineering and Technology, 2017 |
|
Audio-Video Person Clustering in Video Databases, and , Idiap-RR-46-2003 |
|
Latent Enhancing AutoEncoder for Occluded Image Classification, , in: Proceedings of International Conference on Image Processing, 2024 |
|
Domain-Specific Adaptation of CNN for Detecting Face Presentation Attacks in NIR, , , , , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2022 |
|
Multispectral Deep Embeddings As a Countermeasure To Custom Silicone Mask Presentation Attacks, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2019 |
|
Mitigating Demographic Bias in Face Recognition via Regularized Score Calibration, and , in: IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, IEEE/CVF, 2024 |
|
Demographic Fairness Transformer for Bias Mitigation in Face Recognition, and , in: Proceedings of IEEE International Joint Conference on Biometrics (IJCB2024), 2024 |
|
Residual Feature Pyramid Network for Enhancement of Vascular Patterns, and , in: IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022 |
|
Fairness Index Measures to Evaluate Bias in Biometric Recognition, and , in: International Conference on Pattern Recognition Workshops, 2022 |
|
CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR, and , Idiap-RR-10-2020 |
|
CNN Patch Pooling for Detecting 3D Mask Presentation Attacks in NIR, and , in: IEEE International Conference on Image Processing, 2020 |
|
Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science:11, 2019 |
|
Assessing the Reliability of Biometric Authentication on Virtual Reality Devices, , and , Idiap-RR-04-2024 |
|
VRBiom: A New Periocular Dataset for Biometric Applications of HMD, , and , Idiap-RR-03-2024 |
|
Assessing the Reliability of Biometric Authentication on Virtual Reality Devices, , and , in: Proceedings of IEEE International Joint Conference on Biometrics, 2024 |
|
Une application de reconnaissance du locuteur : \\ le User-Customized Password Speaker Verification, , Idiap-Com-04-2004 |
|
A Savitzky-Golay Filtering Perspective of Dynamic Feature Computation, , and , in: IEEE Signal Processing Letters, 20(3):281 -- 284, 2013 |
[DOI] |
Global Optimization with Sparse and Local Gaussian Process Models, and , in: Machine Learning, Optimization, and Big Data, pages 185-196, Springer International Publishing, 2015 |
[DOI] |
Exploring Human Biometrics: A Focus on Security Concerns and Deep Neural Networks, , in: APSIPA Transactions on Signal and Information Processing, 2023 |
[DOI] [URL] |
Towards Measuring the Amount of Discriminatory Information in Finger Vein Biometric Characteristics Using a Relative Entropy Estimator, , , , and , in: Handbook of Vascular Biometrics, pages 507-525, Springer Open, 2019 |
|
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: arXiv, 2022 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 4(1):117-134, 2022 |
[DOI] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2021 |
[URL] |
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: arXiv, 2021 |
[URL] |
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: arXiv, 2021 |
[URL] |
Towards Quantifying the Entropy of Fingervein Patterns across Different Feature Extractors, and , in: 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018 |
|
On the Recognition Performance of BioHash-Protected Finger Vein Templates, and , in: Handbook of Vascular Biometrics, pages 465-480, Springer Open, 2019 |
|
EPFL lab session 1/2: Introduction to Gaussian statistics and pattern recognition, , Idiap-Com-06-2001 |
|
EPFL lab session 2/2: Introduction to Hidden Markov Models, , Idiap-Com-07-2001 |
|
PhD Thesis: Speech Analysis with Production Constraints, , École Polytechnique Fédérale de Lausanne, 2001 |
|
PhD Thesis: Speech Analysis with Production Constraints, , Idiap-RR-35-2001 |
|
LPC modeling with speech production constraints, , in: Proc. 5th Speech Production Seminar, 2000 |
|
Relating LPC modeling to a factor-based articulatory model, , in: Proc. ICSLP 2000, 2000 |
|
LPC-based inversion of the DRM articulatory model, , in: Proc. Eurospeech'99, 1999 |
|
Acoustico-articulatory inversion of unequal-length tube models through lattice inverse filtering, , Idiap-RR-16-1998 |
|
Investigation of a possible process identity between DRM and Linear Filtering, , Idiap-RR-19-1997 |
|
Présentation du Modèle DRM, , Idiap-Com-03-1996 |
|
Signal modeling with Non Uniform Topology lattice filters, and , in: Proc. ICASSP 2001, 2001 |
|
Inverse lattice filtering of speech with adapted non-uniform delays, and , in: Proc. ICSLP 2000, 2000 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |