All publications sorted by title
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |
V
Visuo-Spatial Attention Frame Recognition for Brain-Computer Interfaces, , , , , , and , in: Proceedings of the 1st International Conference on Cognitive Neurodynamics, 2007 |
|
Vlogcast Yourself: Nonverbal Behavior and Attention in Social Media, and , in: Proceedings International Conference on Multimodal Interfaces (ICMI-MLMI), 2010 |
|
Vlogging Over Time: Longitudinal Impressions and Behavior in YouTube, , , , and , in: Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, Cairo, EGYPT, pages 37-46, 2018 |
[DOI] |
VlogSense: Conversational Behavior and Social Attention in YouTube, and , in: Transactions on Multimedia Computing, Communications and Applications, 2011 |
|
Vocal Tract Length Normalization for Statistical Parametric Speech Synthesis, , and , in: IEEE Transactions on Audio, Speech and Language Processing, 2012 |
|
Voice Presentation Attack Detection Using Convolutional Neural Networks, , , , , and , in: Handbook of Biometric Anti-Spoofing, pages 391--415, Springer, 2019 |
[URL] |
Voice transformation, a tool for imposture of speaker verification, and , in: Proceedings of International Phonetic Science conference IPS98, Washington, 1998 |
Voice-B System, , , , and , in: IEEE 4th Workshop on Intercative Voice Technology for Telecommunications Applications (IVTTA'98) September 29--30, Torino, Italy, 1998 |
VoicePhone: An Interactive Vocal Server for Telephone Numbers, , Idiap-Com-04-1996 |
|
Voices of Vlogging, and , in: Proceedings of AAAI International Conference on Weblogs and Social Media, Washington DC, 2010 |
|
Volterra Series for Analyzing MLP based Phoneme Posterior Probability Estimator, , , and , Idiap-RR-69-2008 |
|
Volterra Series for Analyzing MLP based Phoneme Posterior Probability Estimator, , , and , in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2009 |
|
Voyager: Data Discovery for Onboarding in Data Science, , , and , in: 37th IEEE International Conference on Data Engineering (ICDE), 2022 |
VP-STO: Via-point-based Stochastic Trajectory Optimization for Reactive Robot Behavior, , , and , Idiap-RR-04-2023 |
|
VP-STO: Via-point-based Stochastic Trajectory Optimization for Reactive Robot Behavior, , , and , in: Proc. IEEE International Conference on Robotics and Automation (ICRA), 2023 |
|
VRBiom: A New Periocular Dataset for Biometric Applications of HMD, , and , Idiap-RR-03-2024 |
|
VTLN Adaptation for Statistical Speech Synthesis, , , and , in: Proceedings of ICASSP, Dallas, Texas, 2010 |
|
VTLN Adaptation for Statistical Speech Synthesis, , , and , Idiap-RR-41-2009 |
|
VTLN-Based Rapid Cross-Lingual Adaptation for Statistical Parametric Speech Synthesis, , , and , Idiap-RR-12-2012 |
|
Vulnerability Analysis of Face Morphing Attacks from Landmarks and Generative Adversarial Networks, , , and , Idiap-RR-38-2020 |
|
Vulnerability assessment and detection of Deepfake videos, and , in: IAPR International Conference on Biometrics, 2019 |
|
Vulnerability of Automatic Identity Recognition to Audio-Visual Deepfakes, , , and , in: IEEE International Joint Conference on Biometrics, 2023 |
|
Vulnerability of Face Age Verification to Replay Attacks, , , and , in: IEEE International Conference on Acoustics, Speech, and Signal Processing, 2024 |
|
Vulnerability of Face Recognition to Deep Morphing, and , in: International Conference on Biometrics for Borders, 2019 |
|
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack, , and , in: IEEE Transactions on Information Forensics and Security, 19:4585-4600, 2024 |
[DOI] [URL] |
W
Warped Gaussian processes and derivative-based sequential design for functions with heterogeneous variations, , , and , in: SIAM/ASA Journal on Uncertainty Quantification, 6(3):991-1018, 2018 |
WatchNet++: Efficient and accurate depth-based network for detecting people attacks and intrusion, , , and , in: Machine Vision and Applications, 2020 |
|
WatchNet: Efficient and Depth-based Network for People Detection in Video Surveillance Systems, , , and , in: IEEE International Conference on Advanced Video and Signal-based Surveillance, Auckland, NEW ZEALAND, pages 109-114, 2018 |
|
Wave comparisons of clinical characteristics and outcomes of COVID-19 admissions - Exploring the impact of treatment and strain dynamics, , , , , , and , in: Journal of Clinical Virology, 2022 |
We are not Contortionists: Coupled Adaptive Learning for Head and Body Orientation Estimation in Surveillance Video, and , in: IEEE International Conference on Computer Vision and Pattern Recognition, 2012 |
|
Weakly Supervised Learning of Deep Metrics for Stereo Reconstruction, , and , in: Proceedings of the IEEE International Conference on Computer Vision, 2017 |
Weakly Supervised Object Segmentation with Convolutional Neural Networks, and , Idiap-RR-13-2014 |
|
Weakly-Supervised Concept-based Adversarial Learning for Cross-lingual Word Embeddings, , and , in: Proc. 2019 Conference on Empirical Methods in Natural Language Processing, 2019 |
Wearing a YouTube hat: directors, comedians, gurus, and user aggregated behavior, and , in: Proceedings of the 17th ACM International Conference on Multimedia, ACM, 2009 |
|
Weight Initialization for High Order and Multilayer Perceptrons, and , in: Proceedings of the '94 SIPAR--Workshop on Parallel and Distributed Computing, SI Group for Parallel Systems, 1994 |
Weighted Correlation based Atom Decomposition Intonation Modelling, , , and , in: Proceedings of Interspeech, Dresden, Germany, pages 1601--1605, 2015 |
|
Weighting schemes for audio-visual fusion in speech recognition, , , , and , Idiap-RR-44-2000 |
|
What Did You Do Today? Discovering Daily Routines from Large-Scale Mobile Data, and , in: ACM International Conference on Multimedia (ACMMM), 2008 |
|
What Did You Do Today? Discovering Daily Routines from Large-Scale Mobile Data, and , Idiap-RR-49-2008 |
|
What Do Compressed Multilingual Machine Translation Models Forget?, , , , , and , in: The 2022 Conference on Empirical Methods in Natural Language Processing, 2022 |
|
What do individuals with visual impairment need and want from a dialogue-based digital assistant?, , , , and , in: Clinical and Experimental Optometry, 2023 |
What is Better: GMM of Two Gaussians or Two Clusters With One Gaussian?, , Idiap-RR-56-2002 |
|
What is SemEval evaluating? A Systematic Analysis of Evaluation Campaigns in NLP, , , and , in: EMNLP, 2nd Workshop on Evaluation and Comparison of NLP Systems, 2021 |
What Reminds Young People That They Drank More Than Intended on Weekend Nights: An Event-Level Study, , and , in: Journal of Studies on Alcohol and Drugs, 79(4):644-648, 2018 |
[DOI] [URL] |
What to Show? Automatic Stream Selection Among Multiple Sensors, , and , in: International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2014 |
|
What TripAdvisor Can't Tell: Crowdsourcing Urban Impressions for Whole Cities, , and , in: Digital Polis, L'Oeil d'Or (translated to French.), 2018 |
|
What you can't see can help you -- extended-range imaging for 3D-mask presentation attack detection, and , in: Proceedings of the 16th International Conference on Biometrics Special Interest Group., Darmstadt (Germany), Gesellschaft fuer Informatik e.V. (GI), 2017 |
|
What Your Face Vlogs About: Expressions of Emotion and Big-Five Traits Impressions in YouTube, , , and , in: IEEE Transactions Affective Computing, 2014 |
|
When Differential Privacy Meets Graph Neural Networks, and , Idiap-RR-06-2023 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |