All publications sorted by title
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |
B
Behavior of a Bayesian adaptation method for incremental enrollment in speaker verification, , , , , and , Idiap-RR-02-2000 |
|
Benchmarking Non-Parametric Statistical Tests, , and , in: Advances in Neural Information Processing Systems, NIPS 18. MIT Press, 2005 |
|
Benchmarking Non-Parametric Statistical Tests, , and , Idiap-RR-38-2005 |
|
Benefits of Max Pooling in Neural Networks: Theoretical and Experimental Evidence, , and , in: Transactions on Machine Learning Research, 2023 |
BertAA: BERT fine-tuning for Authorship Attribution, , , and , in: Proceedings of the 17th International Conference on Natural Language Processing, 2020 |
|
BertOdia: BERT pre-training for low resource Odia language, , , , , and , Idiap-RR-16-2021 |
|
BERTraffic: A Robust BERT-Based Approach for Speaker Change Detection and Role Identification of Air-Traffic Communications, , , , , , and , Idiap-RR-15-2021 |
BERTraffic: BERT-based Joint Speaker Role and Speaker Change Detection for Air Traffic Control Communications, , , , , , and , in: 2023 IEEE Spoken Language Technology Workshop (SLT), IEEE, 2023 |
[URL] |
Beyond bigrams: call sequencing in the common marmoset (Callithrix jacchus) vocal system, , , , , and , in: Royal Society Open Science, 11(11), 2024 |
[URL] |
Beyond Dataset Bias: Multi-task Unaligned Shared Knowledge Transfer, , , and , in: Asian Conference on Computer Vision, 2012 |
|
Beyond Novelty Detection: Incongruent Events, when General and Specific Classifiers Disagree, , , , , , and , in: Advances in Neural Information Processing Systems 21, 2008 |
|
Beyond question-based biases: Assessing multimodal shortcut learning in visual question answering, , , and , in: Proceedings of the IEEE/CVF International Conference on Computer Vision, 2021 |
|
Beyond Weight Tying: Learning Joint Input-Output Embeddings for Neural Machine Translation, , and , in: Proceedings of the Third Conference on Machine Translation (WMT), 2018 |
|
Bi-directional Training for Composed Image Retrieval via Text Prompt Learning, , , , and , in: IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), 2024 |
[URL] |
Bi-Modal Authentication in Mobile Environments Using Session Variability Modelling, , , , and , Idiap-RR-18-2012 |
|
Bi-Modal Authentication in Mobile Environments Using Session Variability Modelling, , , , and , in: Proceedings of the 21st International Conference on Pattern Recognition, 2012 |
|
Bi-Modal Biometric Authentication on Mobile Phones in Challenging Conditions, , , , and , Idiap-RR-30-2013 |
|
Bi-Modal Biometric Authentication on Mobile Phones in Challenging Conditions, , , , and , in: Image and Vision Computing:1147-1160, 2014 |
[DOI] [URL] |
Bi-Modal Face and Speech Authentication: a BioLogin Demonstration System, , , and , in: Workshop on Multimodal User Authentication (MMUA), 2006 |
|
Bi-Modal Face and Speech Authentication: a BioLogin Demonstration System, , , and , Idiap-RR-18-2006 |
|
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , Idiap-RR-13-2012 |
|
Bi-Modal Person Recognition on a Mobile Phone: using mobile phone data, , , , , , , , , , , , , and , in: IEEE ICME Workshop on Hot Topics in Mobile Multimedia, 2012 |
|
Bias Adaptation for Vocal Tract Length Normalization, , , and , Idiap-RR-12-2013 |
|
Bilateral Teleoperation with Object-Adaptive Mapping, , , , and , in: Complex & Intelligent Systems, 2021 |
|
Bimanual Skill Learning with Pose and Joint Space Constraints, , , and , in: Proc. of the IEEE-RAS Intl Conf. on Humanoid Robots (Humanoids), 2018 |
|
Binary Sparse Coding of Convolutive Mixtures for Sound Localization and Separation via Spatialization, , , , , and , in: IEEE Transactions on Signal Processing, 64(3):567-579, 2016 |
[DOI] |
Bio-Medical Multi-label Scientific Literature Classification using LWAN and Dual-attention module, , , , and , in: PACIFIC ASIA CONFERENCE ON LANGUAGE, INFORMATION AND COMPUTATION (PACLIC 2022), In Proceedings of ACL Anthology, 2022 |
|
Biologically Inspired Spiking Neural Networks for Speech Recognition, , EPFL/EDEE, 2024 |
[DOI] |
Biologically Motivated Audio-Visual Cue Integration for Object, , , , , , , , and , in: Proceedings of the first Internatinal Conference on Cognitive Systems, 2008 |
|
Biomarker identification using dynamic time warping analysis: a longitudinal cohort study of COVID-19 patients in a UK tertiary hospital, , , , , and , in: BMJ Open, 2022 |
Biometric Face Presentation Attack Detection with Multi-Channel Convolutional Neural Network, , , , , and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019 |
|
Biometric Person Authentication IS A Multiple Classifier Problem, and , Idiap-RR-03-2007 |
|
Biometric Person Authentication IS A Multiple Classifier Problem, and , in: 7th International Workshop on Multiple Classifier Systems, MCS, 2007 |
|
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2021 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: arXiv, 2022 |
[URL] |
Biometrics Evaluation under Spoofing Attacks, , and , Idiap-RR-12-2014 |
|
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
Biometrics systems under spoofing attack: an evaluation methodology and lessons learned, , , and , in: IEEE Signal Processing Magazine, 2015 |
|
Biometrics: In Search of Identity and Security (Q & A), , , , , and , in: IEEE MultiMedia, PP, 2017 |
[DOI] |
Bites'n'Bits: Inferring Eating Behavior from Contextual Mobile Data, , , and , in: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (PACM IMWUT), 1(4):125-157, 2017 |
|
Black-box Attacks on Image Activity Prediction and its Natural Language Explanations, , and , in: Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops (ICCVW), 2023 |
[DOI] [URL] |
Blackbird Language Matrices Tasks for Generalization, , , and , in: Proceedings of the 1st GenBench Workshop on (Benchmarking) Generalisation in NLP, ACL, 2023 |
Blackbox Face Reconstruction from Deep Facial Embeddings Using A Different Face Recognition Model, and , in: Proceedings of the IEEE International Conference on Image Processing (ICIP), Kuala Lumpur, Malaysia, pages 2435-2439, 2023 |
[DOI] [URL] |
BLESS: Benchmarking Large Language Models on Sentence Simplification, , , , , , and , in: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, Singapore, 2023 |
|
Blind acoustic source separation for cocktail party speech recognition, , , and , in: ICONIP, 7th IEEE Int. Conf. on Neural Information Processing, 2000 |
Blind separation of delayed and superimposed acoustic sources : learning algorithms an experimental study, , , , and , in: Proc. IEEE Int. Conference on Speech Processing (ICSP), IEEE, 1999 |
BLM-AgrF: A New French Benchmark to Investigate Generalization of Agreement in Neural Networks., , , , and , in: Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023 |
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |