{"id":19361,"date":"2022-10-12T13:46:25","date_gmt":"2022-10-12T17:46:25","guid":{"rendered":"https:\/\/www.crim.ca\/scientific-publications\/"},"modified":"2026-01-12T16:35:22","modified_gmt":"2026-01-12T21:35:22","slug":"publications-scientifiques-archive","status":"publish","type":"page","link":"https:\/\/www.crim.ca\/en\/publications-scientifiques-archive\/","title":{"rendered":"Scientific Publications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"19361\" class=\"elementor elementor-19361 elementor-793\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10a8cd13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10a8cd13\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fa703c\" data-id=\"4fa703c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-dce-advanced-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-01eb596 elementor-invisible elementor-widget elementor-widget-eael-post-list\" data-id=\"01eb596\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"eael-post-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"eael-post-list-container advanced layout-advanced\"><div class=\"eael-post-list-header\"><div class=\"post-categories\" data-nonce=\"f0caf926d9\" data-page-id=\"19361\" data-widget-id=\"01eb596\" data-template={\"dir\":\"pro\",\"file_name\":\"advanced.php\",\"name\":\"Post-List\"} data-widget=\"01eb596\" data-class=\"Essential_Addons_Elementor\\Pro\\Elements\\Post_List\" data-args=\"orderby=date&order=desc&ignore_sticky_posts=1&post_status=publish&posts_per_page=100&offset=0&post_type=publications&tax_query%5B0%5D%5Btaxonomy%5D=publications&tax_query%5B0%5D%5Bfield%5D=term_id&tax_query%5B0%5D%5Bterms%5D%5B0%5D=230&tax_query%5B0%5D%5Bterms%5D%5B1%5D=231&tax_query%5B0%5D%5Bterms%5D%5B2%5D=232&tax_query%5B0%5D%5Bterms%5D%5B3%5D=233&tax_query%5B0%5D%5Bterms%5D%5B4%5D=234&tax_query%5Brelation%5D=AND\" data-settings=\"eael_post_list_post_feature_image=&eael_post_list_post_meta=&eael_post_list_post_title=yes&eael_post_list_post_excerpt=yes&eael_post_list_post_excerpt_length=5000&eael_post_list_pagination=&eael_post_list_layout_type=advanced&eael_post_list_post_cat=&eael_post_list_author_meta=&eael_post_list_title_tag=h3&eael_show_read_more_button=&eael_post_list_excerpt_expanison_indicator=jhnkljb\" data-page=\"1\" data-scroll-on-pagination=\"0\" data-scroll-offset=\"100\" >\n                            <a href=\"javascript:;\" data-taxonomy=\"all\" data-id=\"\" class=\"active post-list-filter-item post-list-cat-01eb596\">All<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"230\" class=\"post-list-filter-item post-list-cat-01eb596\">Acte de conf\u00e9rence<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"231\" class=\"post-list-filter-item post-list-cat-01eb596\">Livre<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"232\" class=\"post-list-filter-item post-list-cat-01eb596\">P\u00e9riodique<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"233\" class=\"post-list-filter-item post-list-cat-01eb596\">Rapport technique<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"234\" class=\"post-list-filter-item post-list-cat-01eb596\">Th\u00e8se \/ M\u00e9moire<\/a><\/div><\/div><div class=\"eael-post-list-wrap\"><div class=\"eael-post-list-posts-wrap eael-post-appender eael-post-appender-01eb596\"><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/a-versatile-and-efficient-approach-to-summarize-speech-into-utterance-level-representations\/\"rel=\"nofollow\">A Versatile and Efficient Approach to Summarize Speech Into Utterance-Level Representations<\/a><\/h3><p>Monteiro, J., Alam, J., Falk, T., &#8220;A Versatile and Efficient Approach to Summarize Speech Into Utterance-Level Representations&#8221;, NeurIPS 2021, Efficient Natural Language and Speech Processing (ENLSP) Workshop, December 13, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/docplayer.net\/214932631-Abc-system-description-for-nist-multimedia-speaker-recognition-evaluation-2019.html\"rel=\"nofollow\">ABC System Description for NIST SRE 2021<\/a><\/h3><p>Alam, J. et al, &#8220;ABC System Description for NIST SRE 2021&#8221;, NIST SRE 2021 Workshop, December 14-16, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/aaai-sas-2022.github.io\/static\/media\/AAAISAS2022_vmix_cameraready-compressed.e0312ee8.pdf\"rel=\"nofollow\">Investigation on Instance Mixup Regularization Strategies for Self-supervised Speaker Representation Learning<\/a><\/h3><p>Kang, W., Alam, J., Fathan, A., &#8220;Investigation on Instance Mixup Regularization Strategies for Self-supervised Speaker Representation Learning&#8221;, AAAI 2022 Self-supervision in Audio and Speech (AAAI 2022 SAS), 28 f\u00e9vrier 2022.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9604987\"rel=\"nofollow\">Joint Service Function Chain Embedding and Routing in Cloud-based NFV: A Deep Q-Learning Based Approach<\/a><\/h3><p>Tran, T. D., Jaumard, B., Duong, H., Nguyen, K.-K., &#8220;Joint Service Function Chain Embedding and Routing in Cloud-based NFV: A Deep Q-Learning Based Approach,&#8221; 2021 IEEE 4th 5G World Forum (5GWF), November 19, 2021, pp. 171-175.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9687877\"rel=\"nofollow\">Hybrid Network with Multi-Level Global-Local Statistics Pooling for Robust Text-Independent Speaker Recognition<\/a><\/h3><p>Kang, W., Alam, J., Fathan, A., &#8220;Hybrid Network with Multi-Level Global-Local Statistics Pooling for Robust Text-Independent Speaker Recognition&#8221;, 2021 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), 3 f\u00e9vrier 2022.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9724945\"rel=\"nofollow\">Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis<\/a><\/h3><p>Jaafar, F., Ameyed, D., Barrak, A., Cheriet, M., &#8220;Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis&#8221;, 2021 IEEE 21st International Conference on Software Quality, Reliability, and Security (QRS), December 6-10, 2021, pp. 514-523.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/syntaxfest.github.io\/syntaxfest21\/proceedings\/UDW-2021.pdf\"rel=\"nofollow\">UD on Software Requirements: Application and Challenges<\/a><\/h3><p>Hassert, N., M\u00e9nard, P. A., Galy, E., &#8220;UD on Software Requirements: Application and Challenges&#8221;, Fifth Workshop on Universal Dependencies, Syntaxfest 2021, March 21-25, 2022.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/espace.etsmtl.ca\/id\/eprint\/2851\/\"rel=\"nofollow\">Adaptation of Deep Siamese Neural Networks for Video Face Recognition<\/a><\/h3><p>Lemoine St-Andr\u00e9, Hugo, &#8220;Adaptation of Deep Siamese Neural Networks for Video Face Recognition&#8221;, Master&#8217;s thesis, \u00c9cole de Technologie Sup\u00e9rieure, Montr\u00e9al, January 24, 2022. Direction: \u00c9. Granger. Co-supervision: M. Dahmane.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/efficient-make-before-break-layer-2-reoptimization\/\"rel=\"nofollow\">Efficient Make-Before-Break Layer 2 Reoptimization<\/a><\/h3><p>Duong, H., Jaumard, B., Coudert, D., Armolavicius, R., &#8220;Efficient Make-Before-Break Layer 2 Reoptimization&#8221;, in IEEE\/ACM Transactions on Networking, Vol. 29, No. 1, in IEEE\/ACM Transactions on Networking, Vol. 29, No. 1, in IEEE\/ACM Transactions on Networking, Vol. 29, No. 1, in IEEE\/ACM Transactions on Networking. 5, pp. 1910-1921, Oct. 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/text-independent-speaker-verification-employing-cnn-lstm-tdnn-hybrid-networks\/\"rel=\"nofollow\">Text-Independent Speaker Verification Employing CNN-LSTM-TDNN Hybrid Networks<\/a><\/h3><p>Alam, J., Fathan, A., Kang, W., &#8220;Text-Independent Speaker Verification Employing CNN-LSTM-TDNN Hybrid Networks&#8221;, 23rd International Conference on Speech and Computer (SPECOM 2021), St. Petersburg, Russia, September 27-30, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/end-to-end-voice-spoofing-detection-employing-time-delay-neural-networks-and-higher-order-statistics\/\"rel=\"nofollow\">End-to-End Voice Spoofing Detection Employing Time Delay Neural Networks and Higher Order Statistics<\/a><\/h3><p>Alam, J., Fathan, A., Kang, W., &#8220;End-to-End Voice Spoofing Detection Employing Time Delay Neural Networks and Higher Order Statistics,&#8221; 23rd International Conference on Speech and Computer (SPECOM 2021), St. Petersburg, Russia, September 27-30, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/an-ensemble-approach-for-the-diagnosis-of-covid-19-from-speech-and-cough-sounds\/\"rel=\"nofollow\">An Ensemble Approach for the Diagnosis of COVID-19 from Speech and Cough Sounds<\/a><\/h3><p>Fathan, A., Alam, J., Kang, W., &#8220;An Ensemble Approach for the Diagnosis of COVID-19 from Speech and Cough Sounds&#8221;, 23rd International Conference on Speech and Computer (SPECOM 2021), St. Petersburg, Russia, September 27-30, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/investigation-on-activation-functions-for-robust-end-to-end-spoofing-attack-detection-system\/\"rel=\"nofollow\">Investigation on Activation Functions for Robust End-to-End Spoofing Attack Detection System<\/a><\/h3><p>Kang, W., Alam, J., Fathan, A., &#8220;Investigation on Activation Functions for Robust End-to-End Spoofing Attack Detection System&#8221;, Automatic Speaker Verification and Spoofing Countermeasures Challenge (ASVspoof 2021 Workshop &#8211; a satellite workshop of INTERSPEECH 2021), September 16, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/crims-system-description-for-the-asvspoof2021-challenge\/\"rel=\"nofollow\">CRIM&#8217;s System Description for the ASVSpoof2021 Challenge<\/a><\/h3><p>Kang, W., Alam, J., Fathan, A., &#8220;CRIM&#8217;s System Description for the ASVSpoof2021 Challenge&#8221;, Automatic Speaker Verification and Spoofing Countermeasures Challenge (ASVspoof 2021 Workshop &#8211; a satellite workshop of INTERSPEECH 2021), September 16, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/classification-automatique-de-nuages-de-points-issus-de-lidar-aeroporte-par-reseau-a-convolutions-continues\/\"rel=\"nofollow\">Automatic classification of point clouds from airborne LiDAR using a continuous convolution network<\/a><\/h3><p>M. Turgeon-Pelchat, &#8220;Automatic classification of point clouds from airborne LiDAR using a continuous convolution network&#8221;. Master&#8217;s thesis, Universit\u00e9 de Sherbrooke, September 14, 2021. Management: Y. Bouroubi. Co-directors: S. Foucher and N. Sabo.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/team02-text-independent-speaker-verification-system-for-sdsv-challenge-2021\/\"rel=\"nofollow\">Team02 Text-Independent Speaker Verification System for SdSV Challenge 2021<\/a><\/h3><p>Kang, W., Kim, N.S., &#8220;Team02 Text-Independent Speaker Verification System for SdSV Challenge 2021&#8221;, INTERSPEECH 2021, Brno, Czech Republic, August 30 &#8211; September 3, 2021, pp. 2312-2316.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/multispecies-detection-and-identification-of-african-mammals-in-aerial-imagery-using-convolutional-neural-networks\/\"rel=\"nofollow\">Multispecies Detection and Identification of African Mammals in Aerial Imagery Using Convolutional Neural Networks<\/a><\/h3><p>Delplanque, A., Foucher, S., Lejeune, P., Linchant, J., Th\u00e9au, J., &#8220;Multispecies Detection and Identification of African Mammals in Aerial Imagery Using Convolutional Neural Networks&#8221;, in Remote Sensing in Ecology and Conservation, 14 p., August 10, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/minimum-disturbance-rerouting-to-optimize-bandwidth-usage\/\"rel=\"nofollow\">Minimum Disturbance Routing to Optimize Bandwidth Usage<\/a><\/h3><p>Duong, H., Jaumard, B., Coudert, D., &#8220;Minimum Disturbance Routing to Optimize Bandwidth Usage&#8221;, 2021 International Conference on Optical Network Design and Modelling (ONDM), Gothenburg, Sweden, June 28 to July 1, 2021, pp. 1-6.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/developpements-algorithmiques-pour-lamelioration-des-resultats-de-linterferometrie-radar-en-milieu-urbain\/\"rel=\"nofollow\">Algorithmic developments to improve the results of RADAR interferometry in urban environments<\/a><\/h3><p>A. Tlili, &#8220;Algorithmic developments for improving RADAR interferometry results in urban environments&#8221;. Ph.D. thesis, Department of Geography, Universit\u00e9 de Montr\u00e9al, July 14, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/caracterisation-de-trottoirs-extraction-automatique-dentites-geographiques-sur-des-images-panoramiques-urbaines-par-reseaux-de-neurones-convolutifs\/\"rel=\"nofollow\">Sidewalk characterization: automatic extraction of geographical features from urban panoramic images using convolutional neural networks<\/a><\/h3><p>R. Tavon, &#8220;Sidewalk characterization: automatic extraction of geographic features from urban panoramic images using convolutional neural networks&#8221;. Master&#8217;s thesis, Universit\u00e9 de Sherbrooke, June 8, 2021. Management: Y. Bouroubi, L. Bellalite and S. Foucher.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/deep-learning-based-classification-of-large-scale-airborne-lidar-point-cloud\/\"rel=\"nofollow\">Deep Learning-Based Classification of Large-Scale Airborne LiDAR Point Cloud<\/a><\/h3><p>Turgeon-Pelchat, M., Foucher, S., Bouroubi, Y., &#8220;Deep Learning-Based Classification of Large-Scale Airborne LiDAR Point Cloud&#8221;, in Canadian Journal of Remote Sensing, Vol. 47, No. 3, pp. 381-395, May 27, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/extended-forgery-detection-framework-for-covid-19-medical-data-using-convolutional-neural-network\/\"rel=\"nofollow\">Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network<\/a><\/h3><p>Gill, S. H., Sheikh, N. A., Rajpar, S., Abidin, Z., Jhanjhi, N. Z., Ahmad, M., Razzaq, M. A., Alshamrani, S. S., Malik, Y., Jaafar, F., &#8220;Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network&#8221;, in Computers, Materials &amp; Continua, Vol. 68, No.3, pp. 3773-3787, May 6, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9246706\"rel=\"nofollow\">On the Impact of Interlanguage Dependencies in Multilanguage Systems Empirical Case Study on Java Native Interface Applications (JNI)<\/a><\/h3><p>M. Grichi, M. Abidi, F. Jaafar, E. E. Eghan and B. Adams, &#8220;On the Impact of Interlanguage Dependencies in Multilanguage Systems Empirical Case Study on Java Native Interface Applications (JNI),&#8221; in IEEE Transactions on Reliability, Volume 70, No. 1, pp. 428-440, March 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/docs.ogc.org\/per\/20-016.html\"rel=\"nofollow\">OGC Testbed-16: Machine Learning Engineering Report<\/a><\/h3><p>P. Vretanos, and al, &#8220;OGC Testbed-16: Machine Learning Engineering Report&#8221;, OGC Public Engineering Report, OGC 20-015r2, February 15, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.pulaval.com\/produit\/medias-sociaux-perspectives-sur-les-defis-lies-a-la-cybersecurite-la-gouvernementalite-algorithmique-et-l-intelligence-artificielle\"rel=\"nofollow\">Social media: perspectives on the challenges of cybersecurity, algorithmic governmentality and artificial intelligence<\/a><\/h3><p>S. Pierre and F. Jaafar. Social media: perspectives on the challenges of cybersecurity, algorithmic governmentality and artificial intelligence. Presses de l&#8217;Universit\u00e9 Laval. February 11, 2021, 192 pages.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/crims-system-description-for-the-third-edition-of-dihard-challenge-2020\/\"rel=\"nofollow\">CRIM\u2019s System Description for the Third Edition of DIHARD Challenge 2020<\/a><\/h3><p>J. Alam, and V. Gupta, \u00ab CRIM\u2019s System Description for the Third Edition of DIHARD Challenge 2020 \u00bb, in The Third DIHARD Speech Diarization Challenge Workshop, January 23, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.springerprofessional.de\/en\/investigating-design-anti-pattern-and-design-pattern-mutations-a\/18772540\"rel=\"nofollow\">Investigating Design Anti-pattern and Design Pattern Mutations and Their Change- and Fault-proneness<\/a><\/h3><p>Z.A. Kermansaravi, M.S. Rahman, F. Khomh, F. Jaafar and Y.-G. Gu\u00e9h\u00e9neuc, &#8220;Investigating Design Anti-pattern and Design Pattern Mutations and Their Change- and Fault-proneness&#8221; in Empirical Software Engineering, Springer, Vol. 26, No. 1, Article 9, January 15, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.mdpi.com\/2673-7418\/1\/1\/4\"rel=\"nofollow\">Train fast while reducing false positives: improving animal classification performance using Convolutional Neural Networks<\/a><\/h3><p>M. Moreni, J. Theau and S. Foucher, &#8220;Train fast while reducing false positives: improving animal classification performance using Convolutional Neural Networks&#8221;, in Geomatics, Vol. 1, pp. 34-49, January 15, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/docs.ogc.org\/per\/20-015r2.html\"rel=\"nofollow\">OGC Testbed-16: Data Access and Processing Engineering Report<\/a><\/h3><p>P. Vretanos, and al, &#8220;OGC Testbed-16: Data Access and Processing Engineering Report&#8221;, OGC Public Engineering Report, OGC 20-016, January 13, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/itea4.org\/project\/workpackage\/document\/download\/6919\/IVVES_Deliverable_D2.2_Training_Data_Quality_V1.0.pdf\"rel=\"nofollow\">Training Data Quality<\/a><\/h3><p>H. P\u00f6l\u00f6nen and al, &#8220;Training Data Quality&#8221;, IVVES Project, Deliverable 2.2, 52 pages, December 31, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/itea4.org\/project\/workpackage\/document\/download\/6924\/IVVES_Deliverable_D3.2_Validation_methods_and_techniques%20_V1.0.pdf\"rel=\"nofollow\">Validation methods and techniques for evolving systems considering use case requirements<\/a><\/h3><p>O. Nguena Timo, A. Petrenko and al., \u00ab Validation methods and techniques for evolving systems considering use case requirements \u00bb, IVVES Project, Deliverable 3.2, 55 pages, December 21, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/savoirs.usherbrooke.ca\/handle\/11143\/17855\"rel=\"nofollow\">Identifying grapevine phytosanitary problems within the plot: combining ultra-high spatial resolution imagery and deep learning<\/a><\/h3><p>J. Boulent, &#8220;Identification of grapevine phytosanitary problems within the plot: combining ultra-high spatial resolution imagery and deep learning&#8221;. PhD thesis, Universit\u00e9 de Sherbrooke, December 18, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9286479\"rel=\"nofollow\">New Interferometric Phase Unwrapping Method Based on Energy Minimization From Contextual Modeling<\/a><\/h3><p>A. Tlili, F. Cavayas, S. Foucher and G. L. Siles, &#8220;New Interferometric Phase Unwrapping Method Based on Energy Minimization From Contextual Modeling&#8221;, in IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Volume 13, pp. 6524-6532, December 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/aclanthology.org\/2020.coling-main.516\/\"rel=\"nofollow\">The Indigenous Languages Technology Project at NRC Canada: an empowerment-oriented approach to developing language software<\/a><\/h3><p>R. Kuhn et al, &#8220;The Indigenous Languages Technology Project at NRC Canada: an empowerment-oriented approach to developing language software&#8221;, in Proceedings of the 28th International Conference on Computational Linguistics (COLING 2020), December 8-13, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2020.564878\/full\"rel=\"nofollow\">Automatic Detection of Flavescence Dor\u00e9e Symptoms Across White Grapevine Varieties Using Deep Learning<\/a><\/h3><p>J. Boulent, P.L. St-Charles, S. Foucher and J. Th\u00e9au, &#8220;Automatic Detection of Flavescence Dor\u00e9e Symptoms Across White Grapevine Varieties Using Deep Learning&#8221;, in Frontiers in Artificial Intelligence, Vol. 3, 96 p., November 30, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/an-ensemble-approach-to-unsupervised-anomalous-sound-detection\/\"rel=\"nofollow\">An Ensemble Approach to Unsupervised Anomalous Sound Detection<\/a><\/h3><p>J. Alam, G. Boulianne, V. Gupta and F. Abderrahim, &#8220;An Ensemble Approach to Unsupervised Anomalous Sound Detection&#8221; in DCASE 2020 Unsupervised Detection of Anomalous Sounds for Machine Condition Monitoring Challenge, November 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.researchgate.net\/publication\/345141986_A_Multi-condition_Training_Strategy_for_Countermeasures_Against_Spoofing_Attacks_to_Speaker_Recognizers\"rel=\"nofollow\">A Multi-condition Training Strategy for Countermeasures Against Spoofing Attacks to Speaker Recognizers<\/a><\/h3><p>J. Montiero, J. Alam, and T. Falk, &#8220;A Multi-condition Training Strategy for Countermeasures Against Spoofing Attacks to Speaker Recognizers&#8221;, in Speaker and Language Recognition Workshop (Odyssey 2020), Tokyo, Japan, November, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/www.fit.vutbr.cz\/research\/groups\/speech\/publi\/2020\/alam_odyssey2020_73.pdf\"rel=\"nofollow\">Analysis of ABC Submission to NIST SRE 2019 CMN and VAST Challenge<\/a><\/h3><p>J. Alam, G. Boulianne, and al, &#8220;Analysis of ABC Submission to NIST SRE 2019 CMN and VAST Challenge&#8221;, in Speaker and Language Recognition Workshop (Odyssey 2020), Tokyo, Japan, November, 2020, pp. 289-295.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/astesj.com\/v05\/i05\/p155\/#1477470909a457-e8a09e7fb-fcb1\"rel=\"nofollow\">A Circular Invariant Convolution Model-Based Mapping for Multimodal Change Detection<\/a><\/h3><p>R. Touati, M. Mignotte and M. Dahmane, &#8220;A Circular Invariant Convolution Model-Based Mapping for Multimodal Change Detection&#8221;, in Advances in Science, Technology and Engineering Systems Journal, Vol. 5, No. 5, pp. 1288-1298, October 26, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/docs.opengeospatial.org\/per\/20-045.html\"rel=\"nofollow\">OGC Earth Observation Applications Pilot: CRIM Engineering Report<\/a><\/h3><p>T. Landry, F. Charette-Migneault, M. Beaulieu, M. Provencher, L.-D. Perron, D. Byrns and S. Foucher, &#8220;OGC Earth Observation Applications Pilot: CRIM Engineering Report&#8221;, OGC Public Engineering Report, OGC 20-045, October 26, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/an-approach-to-evaluating-learning-algorithms-for-decision-trees\/\"rel=\"nofollow\">An Approach to Evaluating Learning Algorithms for Decision Trees<\/a><\/h3><p>T. Xiao, O. Nguena-Timo, F. Avellaneda, Y. Malik, S. D. Bruda, &#8220;An Approach to Evaluating Learning Algorithms for Decision Trees&#8221;, arXiv:2010.13665, 19 p., 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.isca-speech.org\/archive_v0\/Interspeech_2020\/pdfs\/1485.pdf\"rel=\"nofollow\">SdSV Challenge 2020: Large-Scale Evaluation of Short\u2010Duration Speaker Verification<\/a><\/h3><p>H. Zeinali, K. A. Lee, J. Alam, and L. Burget, \u00ab SdSV Challenge 2020: Large-Scale Evaluation of Short\u2010Duration Speaker Verification \u00bb, in INTERSPEECH 2020, Shanghai, Chine, October 25-29, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9222229\"rel=\"nofollow\">A Study of Inductive Biases for Unsupervised Speech Representation Learning<\/a><\/h3><p>G. Boulianne, &#8220;A Study of Inductive Biases for Unsupervised Speech Representation Learning&#8221;, in IEEE\/ACM Transactions on Acoustics, Speech and Language Processing, Vol. 28, pp. 2781-2795, October 13, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/10345-2\/\"rel=\"nofollow\">CRIM&#8217;s Automatic Speech Recognition and Speech Activity Detection Systems Description for the 2020 edition of NIST Open Speech Analytic Technologies Evaluation<\/a><\/h3><p>V. Gupta, J. Alam, G. Boulianne, &#8220;CRIM&#8217;s Automatic Speech Recognition and Speech Activity Detection Systems Description for the 2020 edition of NIST Open Speech Analytic Technologies Evaluation&#8221; in OpenSAT 2020 Evaluation Workshop, USA, September 16, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0885230820300966?via%3Dihub\"rel=\"nofollow\">On the Use of Blind Channel Response Estimation and a Residual Neural Network to Detect Physical Access Attacks to Speaker Verification Systems<\/a><\/h3><p>A. R. Avila, J. Alam, F. O. Costa Prado, D. O&#8217;Shaughnessy, and T. H. Falk, &#8220;On the Use of Blind Channel Response Estimation and a Residual Neural Network to Detect Physical Access Attacks to Speaker Verification Systems&#8221; in Computer Speech &amp; Language Journal, Vol. 66, March 2021 (first online October 20, 2020).<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0885230820300292\"rel=\"nofollow\">Generalized End-to-End Detection of Spoofing Attacks to Automatic Speaker Recognizers<\/a><\/h3><p>J. Montiero, J, Alam, and T. Falk, &#8220;Generalized End-to-End Detection of Spoofing Attacks to Automatic Speaker Recognizers&#8221;, Special issue of Computer Speech &amp; Language Journal, Vol. 63, September, 2020, Article 101096.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/matheo.uliege.be\/handle\/2268.2\/10623\"rel=\"nofollow\">Identifying African Mammal Species in Aerial Images With Object Detection Algorithms<\/a><\/h3><p>A. Delplanque, &#8220;Identifying African Mammal Species in Aerial Images With Object Detection Algorithms&#8221;. Master&#8217;s thesis, University of Li\u00e8ge, Belgium, September 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/espace.etsmtl.ca\/id\/eprint\/2621\/\"rel=\"nofollow\">Unsupervised Speech Representation Learning<\/a><\/h3><p>G. Boulianne, &#8220;Unsupervised Speech Representation Learning&#8221;. PhD thesis, \u00c9cole de Technologie Sup\u00e9rieure, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9251204\"rel=\"nofollow\">Demystifying the Cyber Attribution: An Exploratory Study<\/a><\/h3><p>F. Jaafar, F. Avellaneda, and E.-H. Alikacem, &#8220;Demystifying the Cyber Attribution: An Exploratory Study&#8221; in IEEE Cyber Science and Technology Congress (CyberSciTech 2020), August 18-24, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9251153\"rel=\"nofollow\">Behavioral Study of Malware Affecting Financial Institutions and Clients<\/a><\/h3><p>R. Mishra, S. Butakov, F. Jaafar, and N. Memon, &#8220;Behavioral Study of Malware Affecting Financial Institutions and Clients&#8221; in IEEE Cyber Science and Technology Congress (CyberSciTech 2020), August 18-24, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.researchgate.net\/publication\/342787881_A_short_description_of_the_solver_EvalMaxSAT\"rel=\"nofollow\">A short description of the solver EvalMaxSAT<\/a><\/h3><p>F. Avellaneda, &#8220;A short description of the solver EvalMaxSAT&#8221;, in MaxSAT Evaluation 2020 (MSE 2020), pp. 8-9, Alghero, Italy, July 5-9 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/arxiv.org\/abs\/2002.09469v4\"rel=\"nofollow\">An End-to-End Approach for the Verification Problem: Learning The Right Distance<\/a><\/h3><p>J. Monteiro, I. Albuquerque, J. Alam, D. Hjelm, T. Falk, and C. Jacques, &#8220;An End-to-End Approach for the Verification Problem: Learning The Right Distance&#8221;, in37th International Conference on Machine Learning (ICML 2020), July, 12-18, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3387940.3392197\"rel=\"nofollow\">A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality Perspective<\/a><\/h3><p>M. Santos, F. Jafaar, B. Minetto Napole\u00e3o, F. Petrillo, and D. Ameyed, &#8220;A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality Perspective&#8221;, IEEE\/ACM 42nd International Conference on Software Engineering Workshops (ICSEW&#8217;20), June 2020, pp. 647-654.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9179414\"rel=\"nofollow\">Study of Security Issues in Platform-as-a-Service (PaaS) Cloud Model<\/a><\/h3><p>F. Jaafar, W. Isharufe, and S. Butakov, &#8220;Study of Security Issues in Platform-as-a-Service (PaaS) Cloud Model&#8221;, in IEEE 2nd International Conference on Electrical, Communication and Computer Engineering (ICECCE 2020), Istanbul, Turkey, June 12-13, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9179227\"rel=\"nofollow\">Securing the Authentication Process of LTE Base Stations<\/a><\/h3><p>A. B. Seyi, F. Jafaar, and R. Ruhl, &#8220;Securing the Authentication Process of LTE Base Stations&#8221;, in IEEE 2nd International Conference on Electrical, Communication and Computer Engineering (ICECCE 2020), Istanbul, Turkey, June 12-13, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/the-indigenous-languages-technology-project-at-nrc-canada-an-empowerment-oriented-approach-to-developing-language-software\/\"rel=\"nofollow\">The Indigenous Languages Technology Project at NRC Canada: an empowerment-oriented approach to developing language software<\/a><\/h3><p>R. Kuhn and al., &#8220;The Indigenous Languages Technology Project at NRC Canada: an empowerment-oriented approach to developing language software&#8221;, NRC Publication, June, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s41233-020-00036-z\"rel=\"nofollow\">On the Use of the I-vector Speech Representation for Instrumental Quality Measurement<\/a><\/h3><p>A. R. Avila, J. Alam, D. O&#8217;Shaughnessy, and T. Falk, &#8220;On the Use of the I-vector Speech Representation for Instrumental Quality Measurement&#8221; in Quality and User Experience Journal, Springer, Volume 5, Number 6, June, 2020, pp. 1-14.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9054558\/\"rel=\"nofollow\">An Ensemble Based Approach for Generalized Detection of Spoofing Attacks to Automatic Speaker Recognizers<\/a><\/h3><p>J. Monteiro, J. Alam, and T. Falk, &#8220;An Ensemble Based Approach for Generalized Detection of Spoofing Attacks to Automatic Speaker Recognizers,&#8221; in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2020). pp. 6599-6603, Barcelona, Spain, May 4-8, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/www.lrec-conf.org\/proceedings\/lrec2020\/pdf\/2020.lrec-1.307.pdf\"rel=\"nofollow\">Automatic Transcription Challenges for Inuktitut, a Low-Resource Polysynthetic Language<\/a><\/h3><p>V. Gupta and G. Boulianne, &#8220;Automatic Transcription Challenges for Inuktitut, a Low-Resource Polysynthetic Language&#8221;, in Proceedings of the 12th Language Resources and Evaluation Conference (LREC 2020), pp. 2521-2527, May, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/aclanthology.org\/2020.lrec-1.438\/\"rel=\"nofollow\">On the Performance of Time-Pooling Strategies for End-to-End Spoken Language Identification<\/a><\/h3><p>J. Montiero, J. Alam, and T. Falk, &#8220;On the Performance of Time-Pooling Strategies for End-to-End Spoken Language Identification&#8221; in Proceedings of the 12th Language Resources and Evaluation Conference (LREC 2020), pp. 3566-3572, May, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/www.lrec-conf.org\/proceedings\/lrec2020\/workshops\/SLTUCCURL\/pdf\/2020.sltuccurl-1.51.pdf\"rel=\"nofollow\">Speech Transcription Challenges for Resource Constrained Indigenous Language Cree<\/a><\/h3><p>V. Gupta and G. Boulianne, &#8220;Speech Transcription Challenges for Resource Constrained Indigenous Language Cree&#8221;, in Proceedings of the 1st Joint Workshop on Spoken Language Technologies for Under-resourced languages (SLTU) and Collaboration and Computing for Under-Resourced Languages (CCURL) @LREC 2020, pp. 362-367, May, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9072517\"rel=\"nofollow\">A Multimodal Non-Intrusive Stress Monitoring from the Pleasure-Arousal Emotional Dimensions<\/a><\/h3><p>M. Dahmane, J. Alam, P. St-Charles, M. Lalonde, K. Heffner and S. Foucher, &#8220;A Multimodal Non-Intrusive Stress Monitoring from the Pleasure-Arousal Emotional Dimensions,&#8221; in IEEE Transactions on Affective Computing, April 20, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/en\/publications\/application-des-reseaux-neuronaux-a-convolution-a-lanalyse-des-images-radar-polarimetriques-en-milieu-urbain\/\"rel=\"nofollow\">Application of convolutional neural networks to the analysis of polarimetric radar images in urban environments<\/a><\/h3><p>M. Beaulieu, &#8220;Application des r\u00e9seaux neuronaux \u00e0 convolution \u00e0 l&#8217;analyse des images radar polarim\u00e9triques en milieu urbain&#8221;. Master of Science (M.Sc.) thesis in Geography, Universit\u00e9 de Montr\u00e9al, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.longdom.org\/open-access\/partly-uncoupled-siamese-model-for-change-detection-from-heterogeneous-remote-sensing-imagery.pdf\"rel=\"nofollow\">Partly Uncoupled Siamese Model for Change Detection from Heterogeneous Remote Sensing Imagery<\/a><\/h3><p>R. Touati, M. Mignotte, and M. Dahmane, &#8220;Partly Uncoupled Siamese Model for Change Detection from Heterogeneous Remote Sensing Imagery&#8221; in Journal of Remote Sensing &amp; GIS, Volume 9, (1), pp. 272, March, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8966599\"rel=\"nofollow\">Anomaly Feature Learning for Unsupervised Change Detection in Heterogeneous Images: A Deep Sparse Residual Model<\/a><\/h3><p>R. Touati, M. Mignotte, and M. Dahmane, &#8220;Anomaly Feature Learning for Unsupervised Change Detection in Heterogeneous Images: A Deep Sparse Residual Model&#8221;, in IEEE Journal of Selected Topics in Applied Earth Observations Remote Sensing, Volume 13, pp. 588-600, January 22, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><\/div><\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>TousActe de conf\u00e9renceLivreP\u00e9riodiqueRapport techniqueTh\u00e8se \/ M\u00e9moire ABC System Description for NIST SRE 2021 Alam, J. et al., &#8220;ABC System Description for NIST SRE 2021&#8221;, NIST SRE 2021 Workshop, 14-16 d\u00e9cembre 2021. Investigation on Instance Mixup Regularization Strategies for Self-supervised Speaker Representation Learning Kang, W., Alam, J., Fathan, A., &#8220;Investigation on Instance Mixup Regularization Strategies for [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":14913,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-19361","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/pages\/19361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/comments?post=19361"}],"version-history":[{"count":4,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/pages\/19361\/revisions"}],"predecessor-version":[{"id":28315,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/pages\/19361\/revisions\/28315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/media\/14913"}],"wp:attachment":[{"href":"https:\/\/www.crim.ca\/en\/wp-json\/wp\/v2\/media?parent=19361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}