All publications sorted by journal and type
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |
IEEE Transaction on Image Processing
Embedding Motion in Model-Based Stochastic Tracking, , and , in: IEEE Transaction on Image Processing, 15(11), 2006 |
{IEEE} Transaction on Neural Networks special issue on data mining and knowledge discovery
Taking on the Curse of Dimensionality in Joint Distributions Using Neural Networks, and , in: IEEE Transaction on Neural Networks special issue on data mining and knowledge discovery, 2000 |
|
IEEE Transaction on Pattern Analysis and Machine Intelligence
A Differential Approach for Gaze Estimation, , and , in: IEEE Transaction on Pattern Analysis and Machine Intelligence, 43(3):1092--1098, 2021 |
[DOI] [URL] |
{IEEE} {T}ransaction on {S}ignal {P}rocessing
User Authentication via Adapted Statistical Models of Face Images, , and , in: IEEE Transaction on Signal Processing, 2005 |
|
IEEE Transactions Affective Computing
What Your Face Vlogs About: Expressions of Emotion and Big-Five Traits Impressions in YouTube, , , and , in: IEEE Transactions Affective Computing, 2014 |
|
IEEE Transactions on Audio, Speech, and Language Processing
Tuning-Robust Initialization Methods for Speaker Diarization, and , in: IEEE Transactions on Audio, Speech, and Language Processing, 18(8):2028-2037, 2010 |
[DOI] |
IEEE Transactions on Affective Computing
Rapport with Virtual Agents: What do Human Social Cues and Personality Explain?, , and , in: IEEE Transactions on Affective Computing, 8(3):382-395, 2017 |
[DOI] |
Automatic Attribution of Personality Traits Based on Prosodic Features, and , in: IEEE Transactions on Affective Computing, 2012 |
|
Bridging the Gap Between Social Animal and Unsocial Machine: A Survey of Social Signal Processing, , , , , , and , in: IEEE Transactions on Affective Computing, 2012 |
IEEE Transactions on Audio Speech and Language Processing
An Information Theoretic Combination of MFCC and TDOA Features for Speaker Diarization, , and , in: IEEE Transactions on Audio Speech and Language Processing, 19(2), 2011 |
[DOI] |
An Information Theoretic Approach to Speaker Diarization of Meeting Data, , and , in: IEEE Transactions on Audio Speech and Language Processing, 17(7), 2009 |
[DOI] |
Beamforming with a Maximum Negentropy Criterion, , , , , and , in: IEEE Transactions on Audio Speech and Language Processing, 17(5), 2009 |
|
IEEE Transactions on Audio, Speech and Language Processing
Vocal Tract Length Normalization for Statistical Parametric Speech Synthesis, , and , in: IEEE Transactions on Audio, Speech and Language Processing, 2012 |
|
Modeling Dominance in Group Conversations using NonVerbal Activity Cues, , , and , in: IEEE Transactions on Audio, Speech and Language Processing, 2008 |
|
Short-Term Spatio-Temporal Clustering Applied to Multiple Moving Speakers, and , in: IEEE Transactions on Audio, Speech and Language Processing, 15(5):15, 2007 |
|
IEEE Transactions on Audio, Speech, and Language Processing
Applying multi- and cross-lingual stochastic phone space transformations to non-native speech recognition, , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 2013 |
[DOI] |
The ICSI RT-09 Speaker Diarization System, , , , , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 20(2):371--381, 2012 |
[DOI] |
Transcribing meetings with the AMIDA systems, , , , , , , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 20(2):486--498, 2012 |
[DOI] [URL] |
Wordless Sounds: Robust Speaker Diarization using Privacy-Preserving Audio Representations, , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 2012 |
|
Estimating Dominance in Multi-Party Meetings Using Speaker Diarization, , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 19(4):847-860, 2011 |
|
Privacy-Sensitive Audio Features for Speech/Nonspeech Detection, , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 19(8), 2011 |
|
Transcribing Mandarin Broadcast Speech Using Multi-Layer Perceptron Acoustic Features, , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 19(8), 2011 |
[DOI] |
IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING
Autoregressive Models of Amplitude Modulations in Audio Compression, , and , in: IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, 2010 |
[URL] |
IEEE Transactions on Automation Science and Engineering
SCALAR: Simultaneous Calibration of 2-D Laser and Robot Kinematic Parameters Using Planarity and Distance Constraints, , and , in: IEEE Transactions on Automation Science and Engineering, 16(4):1971-1979, 2019 |
[DOI] |
IEEE Transactions on Biomedical Engineering
Fast Recognition of Anticipation Related Potentials, , and , in: IEEE Transactions on Biomedical Engineering, 2008 |
|
IEEE Transactions on Biometrics, Behavior and Identity Science
A Comprehensive Experimental and Reproducible Study on Selfie Biometrics in Multistream and Heterogeneous Settings, , and , in: IEEE Transactions on Biometrics, Behavior and Identity Science, 2019 |
[DOI] [URL] |
IEEE Transactions on Biometrics, Behavior, and Identity Science
EdgeFace : Efficient Face Recognition Model for Edge Devices, , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024 |
|
From Modalities to Styles: Rethinking the Domain Gap in Heterogeneous Face Recognition, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024 |
|
Template Inversion Attack Using Synthetic Face Images Against Real Face Recognition Systems, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024 |
[DOI] [URL] |
Domain-Specific Adaptation of CNN for Detecting Face Presentation Attacks in NIR, , , , , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2022 |
|
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 4(1):117-134, 2022 |
[DOI] |
Fairness in Biometrics: a figure of merit to assess biometric verification systems, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
[DOI] |
Improving Generalization of Deepfake Detection with Data Farming and Few-Shot Learning, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
|
Towards Protecting and Enhancing Vascular Biometric Recognition methods via Biohashing and Deep Neural Networks, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
[DOI] [URL] |
Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks, , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2020 |
|
Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science:11, 2019 |
|
Multispectral Deep Embeddings As a Countermeasure To Custom Silicone Mask Presentation Attacks, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2019 |
|
IEEE Transactions on Circuits and Systems for Video Technology
Mirror-based Full-View Finger Vein Authentication with Illumination Adaptation, , , , and , in: IEEE Transactions on Circuits and Systems for Video Technology, 2024 |
[DOI] |
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
Efficient Convolutional Neural Networks for Depth-Based Multi-Person Pose Estimation, , , and , in: IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 30(11):4207-4221, 2020 |
[DOI] [URL] |
IEEE Transactions on Circuits and Systems for Video Technology
Finding Structure in Home Videos by Probabilistic Hierarchical Clustering, , and , in: IEEE Transactions on Circuits and Systems for Video Technology, 13(6), 2003 |
|
IEEE Transactions on Cognitive and Developmental Systems
Combining Social and Intrinsically-Motivated Learning for Multi-Task Robot Skill Acquisition, and , in: IEEE Transactions on Cognitive and Developmental Systems, 15(2):385-394, 2023 |
[DOI] |
IEEE Transactions on Computational Imaging
Reconstruction of image sequences from ungated and scanning-aberrated laser scanning microscopy images of the beating heart, , , and , in: IEEE Transactions on Computational Imaging, 6:385--395, 2020 |
[DOI] [URL] |
Simultaneous temporal superresolution and denoising for cardiac fluorescence microscopy, , , and , in: IEEE Transactions on Computational Imaging, 2016 |
[DOI] [URL] |
IEEE Transactions on Image Processing
Spatially-Variant CNN-Based Point Spread Function Estimation for Blind Deconvolution and Depth Estimation in Optical Microscopy, and , in: IEEE Transactions on Image Processing, 29:5848 - 5861, 2020 |
[DOI] |
A Track Creation and Deletion Framework for Long-Term Online Multi-Face Tracking, and , in: IEEE Transactions on Image Processing, 2013 |
|
IEEE Transactions on Information Forensics and Security
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack, , and , in: IEEE Transactions on Information Forensics and Security, 19:4585-4600, 2024 |
[DOI] [URL] |
Measuring Linkability of Protected Biometric Templates Using Maximal Leakage, , and , in: IEEE Transactions on Information Forensics and Security, 18:2262 - 2275, 2023 |
[DOI] [URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles, , and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
On Joint Optimization of Automatic Speaker Verification and Anti-spoofing in the Embedding Space, , , , and , in: IEEE Transactions on Information Forensics and Security, 16:1579--1593, 2021 |
[DOI] |
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 |