All publications sorted by journal and type
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |
IEEE Transactions on Audio Speech and Language Processing
An Information Theoretic Approach to Speaker Diarization of Meeting Data, , and , in: IEEE Transactions on Audio Speech and Language Processing, 17(7), 2009 |
[DOI] |
Beamforming with a Maximum Negentropy Criterion, , , , , and , in: IEEE Transactions on Audio Speech and Language Processing, 17(5), 2009 |
|
IEEE Transactions on Audio, Speech and Language Processing
Vocal Tract Length Normalization for Statistical Parametric Speech Synthesis, , and , in: IEEE Transactions on Audio, Speech and Language Processing, 2012 |
|
Modeling Dominance in Group Conversations using NonVerbal Activity Cues, , , and , in: IEEE Transactions on Audio, Speech and Language Processing, 2008 |
|
Short-Term Spatio-Temporal Clustering Applied to Multiple Moving Speakers, and , in: IEEE Transactions on Audio, Speech and Language Processing, 15(5):15, 2007 |
|
IEEE Transactions on Audio, Speech, and Language Processing
Applying multi- and cross-lingual stochastic phone space transformations to non-native speech recognition, , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 2013 |
[DOI] |
The ICSI RT-09 Speaker Diarization System, , , , , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 20(2):371--381, 2012 |
[DOI] |
Transcribing meetings with the AMIDA systems, , , , , , , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 20(2):486--498, 2012 |
[DOI] [URL] |
Wordless Sounds: Robust Speaker Diarization using Privacy-Preserving Audio Representations, , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 2012 |
|
Estimating Dominance in Multi-Party Meetings Using Speaker Diarization, , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 19(4):847-860, 2011 |
|
Privacy-Sensitive Audio Features for Speech/Nonspeech Detection, , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 19(8), 2011 |
|
Transcribing Mandarin Broadcast Speech Using Multi-Layer Perceptron Acoustic Features, , , , and , in: IEEE Transactions on Audio, Speech, and Language Processing, 19(8), 2011 |
[DOI] |
IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING
Autoregressive Models of Amplitude Modulations in Audio Compression, , and , in: IEEE TRANSACTIONS ON AUDIO, SPEECH, AND LANGUAGE PROCESSING, 2010 |
[URL] |
IEEE Transactions on Automation Science and Engineering
SCALAR: Simultaneous Calibration of 2-D Laser and Robot Kinematic Parameters Using Planarity and Distance Constraints, , and , in: IEEE Transactions on Automation Science and Engineering, 16(4):1971-1979, 2019 |
[DOI] |
IEEE Transactions on Biomedical Engineering
Fast Recognition of Anticipation Related Potentials, , and , in: IEEE Transactions on Biomedical Engineering, 2008 |
|
IEEE Transactions on Biometrics, Behavior and Identity Science
A Comprehensive Experimental and Reproducible Study on Selfie Biometrics in Multistream and Heterogeneous Settings, , and , in: IEEE Transactions on Biometrics, Behavior and Identity Science, 2019 |
[DOI] [URL] |
IEEE Transactions on Biometrics, Behavior, and Identity Science
EdgeFace : Efficient Face Recognition Model for Edge Devices, , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024 |
|
From Modalities to Styles: Rethinking the Domain Gap in Heterogeneous Face Recognition, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024 |
|
Template Inversion Attack Using Synthetic Face Images Against Real Face Recognition Systems, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2024 |
[DOI] [URL] |
Domain-Specific Adaptation of CNN for Detecting Face Presentation Attacks in NIR, , , , , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2022 |
|
Towards Protecting Face Embeddings in Mobile Face Verification Scenarios, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 4(1):117-134, 2022 |
[DOI] |
Fairness in Biometrics: a figure of merit to assess biometric verification systems, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
[DOI] |
Improving Generalization of Deepfake Detection with Data Farming and Few-Shot Learning, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
|
Towards Protecting and Enhancing Vascular Biometric Recognition methods via Biohashing and Deep Neural Networks, and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021 |
[DOI] [URL] |
Deep Models and Shortwave Infrared Information to Detect Face Presentation Attacks, , , , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2020 |
|
Detection of Age-Induced Makeup Attacks on Face Recognition Systems Using Multi-Layer Deep Features, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science:11, 2019 |
|
Multispectral Deep Embeddings As a Countermeasure To Custom Silicone Mask Presentation Attacks, , and , in: IEEE Transactions on Biometrics, Behavior, and Identity Science, 2019 |
|
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
Efficient Convolutional Neural Networks for Depth-Based Multi-Person Pose Estimation, , , and , in: IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 30(11):4207-4221, 2020 |
[DOI] [URL] |
IEEE Transactions on Circuits and Systems for Video Technology
Finding Structure in Home Videos by Probabilistic Hierarchical Clustering, , and , in: IEEE Transactions on Circuits and Systems for Video Technology, 13(6), 2003 |
|
IEEE Transactions on Cognitive and Developmental Systems
Combining Social and Intrinsically-Motivated Learning for Multi-Task Robot Skill Acquisition, and , in: IEEE Transactions on Cognitive and Developmental Systems, 15(2):385-394, 2023 |
[DOI] |
IEEE Transactions on Computational Imaging
Reconstruction of image sequences from ungated and scanning-aberrated laser scanning microscopy images of the beating heart, , , and , in: IEEE Transactions on Computational Imaging, 6:385--395, 2020 |
[DOI] [URL] |
Simultaneous temporal superresolution and denoising for cardiac fluorescence microscopy, , , and , in: IEEE Transactions on Computational Imaging, 2016 |
[DOI] [URL] |
IEEE Transactions on Image Processing
Spatially-Variant CNN-Based Point Spread Function Estimation for Blind Deconvolution and Depth Estimation in Optical Microscopy, and , in: IEEE Transactions on Image Processing, 29:5848 - 5861, 2020 |
[DOI] |
A Track Creation and Deletion Framework for Long-Term Online Multi-Face Tracking, and , in: IEEE Transactions on Image Processing, 2013 |
|
IEEE Transactions on Information Forensics and Security
Vulnerability of State-of-the-Art Face Recognition Models to Template Inversion Attack, , and , in: IEEE Transactions on Information Forensics and Security, 19:4585-4600, 2024 |
[DOI] [URL] |
Measuring Linkability of Protected Biometric Templates Using Maximal Leakage, , and , in: IEEE Transactions on Information Forensics and Security, 18:2262 - 2275, 2023 |
[DOI] [URL] |
Biometric Template Protection for Neural-Network-based Face Recognition Systems: A Survey of Methods and Evaluation Techniques, and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
Prepended Domain Transformer: Heterogeneous Face Recognition without Bells and Whistles, , and , in: IEEE Transactions on Information Forensics and Security, 2022 |
|
On Joint Optimization of Automatic Speaker Verification and Anti-spoofing in the Embedding Space, , , , and , in: IEEE Transactions on Information Forensics and Security, 16:1579--1593, 2021 |
[DOI] |
Learning One Class Representations for Face Presentation Attack Detection using Multi-channel Convolutional Neural Networks, and , in: IEEE Transactions on Information Forensics and Security, 2020 |
|
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Biometric Face Presentation Attack Detection with Multi-Channel Convolutional Neural Network, , , , , and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019 |
|
IEEE Transactions on Information Forensics and Security
Heterogeneous Face Recognition Using Domain Specific Units, , and , in: IEEE Transactions on Information Forensics and Security:13, 2019 |
[DOI] |
Joint Speaker Verification and Anti-Spoofing in the i-Vector Space, , , , and , in: IEEE Transactions on Information Forensics and Security, 10(4):821-832, 2015 |
[DOI] |
Biometrics Evaluation Under Spoofing Attacks, , and , in: IEEE Transactions on Information Forensics and Security, 9(12):2264-2276, 2014 |
[DOI] |
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Spoofing Face Recognition with 3D Masks, and , in: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY:1084-1097, 2014 |
[DOI] |
IEEE Transactions on Information Forensics and Security
A Fast Parts-based Approach to Speaker Verification using Boosted Slice Classifiers, , and , in: IEEE Transactions on Information Forensics and Security, 7(1):241-254, 2012 |
|
Cross-pollination of normalisation techniques from speaker to face authentication using Gaussian mixture models, , , and , in: IEEE Transactions on Information Forensics and Security, 7(2):553 -- 562, 2012 |
|
IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing
On the use of client identity information for face anti-spoofing, and , in: IEEE Transactions on Information Forensics and Security, Special Issue on Biometric Anti-spoofing, 10(4):787-796, 2015 |
|
IEEE Transactions on Medical Imaging
Learning-Based Compressive MRI, , , , , , and , in: IEEE Transactions on Medical Imaging, 2018 |
|
IEEE Transactions on Mobile Computing
DrinkSense: Characterizing Youth Drinking Behavior using Smartphones, , , , , and , in: IEEE Transactions on Mobile Computing, 2018 |
|
| 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 |