Author of the publication

M2Met: The Icassp 2022 Multi-Channel Multi-Party Meeting Transcription Challenge.

, , , , , , , , , , , and . ICASSP, page 6167-6171. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Analysis of an Identity-Based Signature From Factorization Problem., , , and . IEEE Access, (2020)Using Control Theory to Guide Load Shedding in Medical Data Stream Management System., , , , , , , and . ASIAN, volume 3818 of Lecture Notes in Computer Science, page 236-248. Springer, (2005)A Three-Dimensional Ultrasonic Pen-Type Input Device With Millimeter-Level Accuracy for Human-Computer Interaction., , , and . IEEE Access, (2020)Library resources semantization based on resource ontology., , and . Electron. Libr., 32 (3): 341-362 (2014)A Trace-restricted Kronecker-Factored Approximation to Natural Gradient., , , , , , and . CoRR, (2020)A Composite Internal Model Robust Control Strategy for an Automobile Steer-by-wire System., , and . IECON, page 29-34. IEEE, (2020)A Multi-Vehicle Longitudinal Trajectory Collision Avoidance Strategy Using AEBS With Vehicle-Infrastructure Communication., , , , , , , , and . IEEE Trans. Veh. Technol., 71 (2): 1253-1266 (2022)The acquisition method of the user's Kansei needs based on double matrix recommendation algorithm., , , and . J. Intell. Fuzzy Syst., 41 (2): 3809-3820 (2021)Toward In-Band Self-Organization in Energy-Efficient MAC Protocols for Sensor Networks., , and . IEEE Trans. Mob. Comput., 7 (2): 156-170 (2008)Cryptanalysis of an Identity-Based Encryption Scheme With Equality Test and Improvement., , , , and . IEEE Access, (2019)