Get my own profile
Public access
View all41 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Haizhou LiThe Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), China; NUS, SingaporeVerified email at u.nus.edu
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Simon KingProfessor of Speech Processing, University of EdinburghVerified email at ed.ac.uk
Eng-Siong ChngNanyang Technological UniversityVerified email at ntu.edu.sg
Yuancheng WangThe Chinese University of Hong Kong, ShenzhenVerified email at link.cuhk.edu.cn
Nicholas EvansProfessor, Audio Security and Privacy, EURECOM, FranceVerified email at eurecom.fr
Xueyao ZhangThe Chinese University of Hong Kong, ShenzhenVerified email at link.cuhk.edu.cn
Xiaohai TianNational University of Singapore (NUS)Verified email at nus.edu.sg
Yicheng GuAalto UniversityVerified email at aalto.fi
Chaoren WangThe Chinese University of Hong Kong, ShenzhenVerified email at link.cuhk.edu.cn
Junan ZhangThe Chinese University of Hong Kong, ShenzhenVerified email at link.cuhk.edu.cn
Jiaqi LiThe Chinese University of Hong Kong, ShenzhenVerified email at link.cuhk.edu.cn
Mirjam WesterIOG (IOHK) & University of EdinburghVerified email at inf.ed.ac.uk
Alegre FedericoValidSoft LimitedVerified email at validsoft.com
Aleksandr SizovUniversity of Eastern FinlandVerified email at cs.uef.fi
Haorui He (何昊睿)The University of Hong KongVerified email at connect.hku.hk
Tomoki TodaNagoya UniversityVerified email at icts.nagoya-u.ac.jp
Yao QianMicrosoftVerified email at microsoft.com
Liumeng XueHong Kong University of Science and TechnologyVerified email at ust.hk