{"id":793,"date":"2020-10-28T02:39:06","date_gmt":"2020-10-28T02:39:06","guid":{"rendered":"https:\/\/wpmanstage.com\/crim\/?page_id=793"},"modified":"2025-06-09T18:08:28","modified_gmt":"2025-06-09T22:08:28","slug":"publications-scientifiques-archive","status":"publish","type":"page","link":"https:\/\/www.crim.ca\/fr\/publications-scientifiques-archive\/","title":{"rendered":"Publications scientifiques"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"793\" class=\"elementor elementor-793\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10a8cd13 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10a8cd13\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fa703c\" data-id=\"4fa703c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-dce-advanced-background-color=\"#FFFFFF\" class=\"elementor-element elementor-element-01eb596 elementor-invisible elementor-widget elementor-widget-eael-post-list\" data-id=\"01eb596\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"eael-post-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"eael-post-list-container advanced layout-advanced\"><div class=\"eael-post-list-header\"><div class=\"post-categories\" data-nonce=\"d46fe02ab6\" data-page-id=\"793\" data-widget-id=\"01eb596\" data-template={\"dir\":\"pro\",\"file_name\":\"advanced.php\",\"name\":\"Post-List\"} data-widget=\"01eb596\" data-class=\"Essential_Addons_Elementor\\Pro\\Elements\\Post_List\" data-args=\"orderby=date&order=desc&ignore_sticky_posts=1&post_status=publish&posts_per_page=100&offset=0&post_type=publications&tax_query%5B0%5D%5Btaxonomy%5D=publications&tax_query%5B0%5D%5Bfield%5D=term_id&tax_query%5B0%5D%5Bterms%5D%5B0%5D=230&tax_query%5B0%5D%5Bterms%5D%5B1%5D=231&tax_query%5B0%5D%5Bterms%5D%5B2%5D=232&tax_query%5B0%5D%5Bterms%5D%5B3%5D=233&tax_query%5B0%5D%5Bterms%5D%5B4%5D=234&tax_query%5Brelation%5D=AND\" data-settings=\"eael_post_list_post_feature_image=&eael_post_list_post_meta=&eael_post_list_post_title=yes&eael_post_list_post_excerpt=yes&eael_post_list_post_excerpt_length=5000&eael_post_list_pagination=&eael_post_list_layout_type=advanced&eael_post_list_post_cat=&eael_post_list_author_meta=&eael_post_list_title_tag=h3&eael_show_read_more_button=&eael_post_list_excerpt_expanison_indicator=jhnkljb\" data-page=\"1\" data-scroll-on-pagination=\"0\" data-scroll-offset=\"100\" >\n                            <a href=\"javascript:;\" data-taxonomy=\"all\" data-id=\"\" class=\"active post-list-filter-item post-list-cat-01eb596\">Tous<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"230\" class=\"post-list-filter-item post-list-cat-01eb596\">Acte de conf\u00e9rence<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"231\" class=\"post-list-filter-item post-list-cat-01eb596\">Livre<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"232\" class=\"post-list-filter-item post-list-cat-01eb596\">P\u00e9riodique<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"233\" class=\"post-list-filter-item post-list-cat-01eb596\">Rapport technique<\/a><a href=\"javascript:;\" data-taxonomy=\"publications\" data-id=\"234\" class=\"post-list-filter-item post-list-cat-01eb596\">Th\u00e8se \/ M\u00e9moire<\/a><\/div><\/div><div class=\"eael-post-list-wrap\"><div class=\"eael-post-list-posts-wrap eael-post-appender eael-post-appender-01eb596\"><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/docplayer.net\/214932631-Abc-system-description-for-nist-multimedia-speaker-recognition-evaluation-2019.html\"rel=\"nofollow\">ABC System Description for NIST SRE 2021<\/a><\/h3><p>Alam, J. et al., &#8220;ABC System Description for NIST SRE 2021&#8221;, NIST SRE 2021 Workshop, 14-16 d\u00e9cembre 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/aaai-sas-2022.github.io\/static\/media\/AAAISAS2022_vmix_cameraready-compressed.e0312ee8.pdf\"rel=\"nofollow\">Investigation on Instance Mixup Regularization Strategies for Self-supervised Speaker Representation Learning<\/a><\/h3><p>Kang, W., Alam, J., Fathan, A., &#8220;Investigation on Instance Mixup Regularization Strategies for Self-supervised Speaker Representation Learning&#8221;, AAAI 2022 Self-supervision in Audio and Speech (AAAI 2022 SAS), 28 f\u00e9vrier 2022.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9604987\"rel=\"nofollow\">Joint Service Function Chain Embedding and Routing in Cloud-based NFV: A Deep Q-Learning Based Approach<\/a><\/h3><p>Tran, T. D., Jaumard, B., Duong, H., Nguyen, K.-K., &#8220;Joint Service Function Chain Embedding and Routing in Cloud-based NFV: A Deep Q-Learning Based Approach,&#8221; 2021 IEEE 4th 5G World Forum (5GWF), 19 novembre 2021, pp. 171-175.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9687877\"rel=\"nofollow\">Hybrid Network with Multi-Level Global-Local Statistics Pooling for Robust Text-Independent Speaker Recognition<\/a><\/h3><p>Kang, W., Alam, J., Fathan, A., &#8220;Hybrid Network with Multi-Level Global-Local Statistics Pooling for Robust Text-Independent Speaker Recognition&#8221;, 2021 IEEE Automatic Speech Recognition and Understanding Workshop (ASRU), 3 f\u00e9vrier 2022.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9724945\"rel=\"nofollow\">Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis<\/a><\/h3><p>Jaafar, F., Ameyed, D., Barrak, A., Cheriet, M., &#8220;Identification of Compromised IoT Devices: Combined Approach Based on Energy Consumption and Network Traffic Analysis&#8221;, 2021 IEEE 21st International Conference on Software Quality, Reliability, and Security (QRS), 6-10 d\u00e9cembre 2021, pp. 514-523.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/neurips2021-nlp.github.io\/papers\/2\/CameraReady\/ENLSP_MLTDNN.pdf\"rel=\"nofollow\">A Versatile and Efficient Approach to Summarize Speech Into Utterance-Level Representations<\/a><\/h3><p>Monteiro, J., Alam, J., Falk, T., &#8220;A Versatile and Efficient Approach to Summarize Speech Into Utterance-Level Representations&#8221;, NeurIPS 2021, Efficient Natural Language and Speech Processing (ENLSP) Workshop, 13 d\u00e9cembre 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/syntaxfest.github.io\/syntaxfest21\/proceedings\/UDW-2021.pdf\"rel=\"nofollow\">UD on Software Requirements: Application and Challenges<\/a><\/h3><p>Hassert, N., M\u00e9nard, P. A., Galy, E., &#8220;UD on Software Requirements: Application and Challenges&#8221;, Fifth Workshop on Universal Dependencies, Syntaxfest 2021, 21-25 mars 2022.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/espace.etsmtl.ca\/id\/eprint\/2851\/\"rel=\"nofollow\">Adaptation of Deep Siamese Neural Networks for Video Face Recognition<\/a><\/h3><p>Lemoine St-Andr\u00e9, Hugo, &#8220;Adaptation of Deep Siamese Neural Networks for Video Face Recognition&#8221;, M\u00e9moire de Ma\u00eetrise, \u00c9cole de Technologie Sup\u00e9rieure, Montr\u00e9al, 24 janvier 2022. Direction : \u00c9. Granger. Co-direction : M. Dahmane.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.computer.org\/csdl\/journal\/nt\/2021\/05\/09462438\/1uDSqGcEvEk\"rel=\"nofollow\">Efficient Make-Before-Break Layer 2 Reoptimization<\/a><\/h3><p>Duong, H., Jaumard, B., Coudert, D., Armolavicius, R., &#8220;Efficient Make-Before-Break Layer 2 Reoptimization&#8221;, in IEEE\/ACM Transactions on Networking, Vol. 29, No. 5, pp. 1910\u20131921, Oct. 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-87802-3_18\"rel=\"nofollow\">An Ensemble Approach for the Diagnosis of COVID-19 from Speech and Cough Sounds<\/a><\/h3><p>Fathan, A., Alam, J., Kang, W., &#8220;An Ensemble Approach for the Diagnosis of COVID-19 from Speech and Cough Sounds&#8221;, 23rd International Conference on Speech and Computer (SPECOM 2021), Saint-P\u00e9tersbourg, Russie, 27-30 septembre 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-87802-3_2\"rel=\"nofollow\">End-to-End Voice Spoofing Detection Employing Time Delay Neural Networks and Higher Order Statistics<\/a><\/h3><p>Alam, J., Fathan, A., Kang, W., &#8220;End-to-End Voice Spoofing Detection Employing Time Delay Neural Networks and Higher Order Statistics&#8221;, 23rd International Conference on Speech and Computer (SPECOM 2021), Saint-P\u00e9tersbourg, Russie, 27-30 septembre 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-87802-3_1\"rel=\"nofollow\">Text-Independent Speaker Verification Employing CNN-LSTM-TDNN Hybrid Networks<\/a><\/h3><p>Alam, J., Fathan, A., Kang, W., &#8220;Text-Independent Speaker Verification Employing CNN-LSTM-TDNN Hybrid Networks&#8221;, 23rd International Conference on Speech and Computer (SPECOM 2021), Saint-P\u00e9tersbourg, Russie, 27-30 septembre 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.isca-speech.org\/archive\/asvspoof_2021\/kang21b_asvspoof.html#:~:text=The%20challenge%20provides%20a%20difficult,augmented%20with%20various%20audio%20codecs.\"rel=\"nofollow\">CRIM&#8217;s System Description for the ASVSpoof2021 Challenge<\/a><\/h3><p>Kang, W., Alam, J., Fathan, A., &#8220;CRIM&#8217;s System Description for the ASVSpoof2021 Challenge&#8221;, Automatic Speaker Verification and Spoofing Countermeasures Challenge (ASVspoof 2021 Workshop &#8211; a satellite workshop of INTERSPEECH 2021), September 16, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/fr\/publications\/investigation-on-activation-functions-for-robust-end-to-end-spoofing-attack-detection-system\/\"rel=\"nofollow\">Investigation on Activation Functions for Robust End-to-End Spoofing Attack Detection System<\/a><\/h3><p>Kang, W., Alam, J., Fathan, A., &#8220;Investigation on Activation Functions for Robust End-to-End Spoofing Attack Detection System&#8221;, Automatic Speaker Verification and Spoofing Countermeasures Challenge (ASVspoof 2021 Workshop &#8211; a satellite workshop of INTERSPEECH 2021), September 16, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/savoirs.usherbrooke.ca\/handle\/11143\/18699?locale-attribute=fr\"rel=\"nofollow\">Classification automatique de nuages de points issus de LiDAR a\u00e9roport\u00e9 par r\u00e9seau \u00e0 convolutions continues<\/a><\/h3><p>M. Turgeon-Pelchat, \u00ab Classification automatique de nuages de points issus de LiDAR a\u00e9roport\u00e9 par r\u00e9seau \u00e0 convolutions continues \u00bb. \u00a0M\u00e9moire de ma\u00eetrise, Universit\u00e9 de Sherbrooke, 14 septembre 2021. Direction : Y. Bouroubi. Co-direction : S. Foucher et N. Sabo.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.isca-speech.org\/archive\/pdfs\/interspeech_2021\/kang21_interspeech.pdf\"rel=\"nofollow\">Team02 Text-Independent Speaker Verification System for SdSV Challenge 2021<\/a><\/h3><p>Kang, W., Kim, N.S., &#8220;Team02 Text-Independent Speaker Verification System for SdSV Challenge 2021&#8221;, INTERSPEECH 2021, Brno, R\u00e9publique Tch\u00e8que, 30 ao\u00fbt &#8211; 3 septembre 2021, pp. 2312-2316.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/zslpublications.onlinelibrary.wiley.com\/doi\/10.1002\/rse2.234\"rel=\"nofollow\">Multispecies Detection and Identification of African Mammals in Aerial Imagery Using Convolutional Neural Networks<\/a><\/h3><p>Delplanque, A., Foucher, S., Lejeune, P., Linchant, J., Th\u00e9au, J., &#8220;Multispecies Detection and Identification of African Mammals in Aerial Imagery Using Convolutional Neural Networks&#8221;, in Remote Sensing in Ecology and Conservation, 14 p., August 10, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9492388\"rel=\"nofollow\">Minimum Disturbance Rerouting to Optimize Bandwidth Usage<\/a><\/h3><p>Duong, H., Jaumard, B., Coudert, D., &#8220;Minimum Disturbance Rerouting to Optimize Bandwidth Usage&#8221;, 2021 International Conference on Optical Network Design and Modelling (ONDM), Gothenburg, Sweden, Juin 28 to July 1, 2021, pp. 1-6.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/papyrus.bib.umontreal.ca\/xmlui\/handle\/1866\/25613\"rel=\"nofollow\">D\u00e9veloppements algorithmiques pour l\u2019am\u00e9lioration des r\u00e9sultats de l\u2019interf\u00e9rom\u00e9trie RADAR en milieu urbain<\/a><\/h3><p>A. Tlili, \u00ab D\u00e9veloppements algorithmiques pour l\u2019am\u00e9lioration des r\u00e9sultats de l\u2019interf\u00e9rom\u00e9trie RADAR en milieu urbain \u00bb. Th\u00e8se de doctorat (Ph. D.), D\u00e9partement de g\u00e9ographie, Universit\u00e9 de Montr\u00e9al, 14 juillet 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/savoirs.usherbrooke.ca\/handle\/11143\/18423\"rel=\"nofollow\">Caract\u00e9risation de trottoirs : extraction automatique d\u2019entit\u00e9s g\u00e9ographiques sur des images panoramiques urbaines par r\u00e9seaux de neurones convolutifs<\/a><\/h3><p>R. Tavon, \u00ab Caract\u00e9risation de trottoirs : extraction automatique d\u2019entit\u00e9s g\u00e9ographiques sur des images panoramiques urbaines par r\u00e9seaux de neurones convolutifs \u00bb. M\u00e9moire de ma\u00eetrise, Universit\u00e9 de Sherbrooke, 8 juin 2021. Direction : Y. Bouroubi, L. Bellalite et S. Foucher.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/07038992.2021.1927687?journalCode=ujrs20\"rel=\"nofollow\">Deep Learning-Based Classification of Large-Scale Airborne LiDAR Point Cloud<\/a><\/h3><p>Turgeon-Pelchat, M., Foucher, S., Bouroubi, Y., &#8220;Deep Learning-Based Classification of Large-Scale Airborne LiDAR Point Cloud&#8221;, in Canadian Journal of Remote Sensing, Vol. 47, No. 3, pp. 381-395, May 27, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.techscience.com\/cmc\/v68n3\/42466\"rel=\"nofollow\">Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network<\/a><\/h3><p>Gill, S. H., Sheikh, N. A., Rajpar, S., Abidin, Z., Jhanjhi, N. Z., Ahmad, M., Razzaq, M. A., Alshamrani, S. S., Malik, Y., Jaafar, F., &#8220;Extended Forgery Detection Framework for COVID-19 Medical Data Using Convolutional Neural Network&#8221;, in Computers, Materials &amp; Continua, Vol. 68, No.3, pp. 3773\u20133787, May 6, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9246706\"rel=\"nofollow\">On the Impact of Interlanguage Dependencies in Multilanguage Systems Empirical Case Study on Java Native Interface Applications (JNI)<\/a><\/h3><p>M. Grichi, M. Abidi, F. Jaafar, E. E. Eghan and B. Adams, &#8220;On the Impact of Interlanguage Dependencies in Multilanguage Systems Empirical Case Study on Java Native Interface Applications (JNI),&#8221; in\u00a0IEEE Transactions on Reliability, Volume 70, No. 1, pp. 428-440, March 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/docs.ogc.org\/per\/20-016.html\"rel=\"nofollow\">OGC Testbed-16: Machine Learning Engineering Report<\/a><\/h3><p>P. Vretanos, and al., \u00ab OGC Testbed-16: Machine Learning Engineering Report \u00bb, OGC Public Engineering Report, OGC 20-015r2, February 15, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.pulaval.com\/produit\/medias-sociaux-perspectives-sur-les-defis-lies-a-la-cybersecurite-la-gouvernementalite-algorithmique-et-l-intelligence-artificielle\"rel=\"nofollow\">M\u00e9dias sociaux : perspectives sur les d\u00e9fis li\u00e9s \u00e0 la cybers\u00e9curit\u00e9, la gouvernementalit\u00e9 algorithmique et l&#8217;intelligence artificielle<\/a><\/h3><p>S. Pierre et F. Jaafar. M\u00e9dias sociaux : perspectives sur les d\u00e9fis li\u00e9s \u00e0 la cybers\u00e9curit\u00e9, la gouvernementalit\u00e9 algorithmique et l&#8217;intelligence artificielle. Presses de l&#8217;Universit\u00e9 Laval. 11 f\u00e9vrier 2021, 192 pages.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/fr\/publications\/crims-system-description-for-the-third-edition-of-dihard-challenge-2020\/\"rel=\"nofollow\">CRIM\u2019s System Description for the Third Edition of DIHARD Challenge 2020<\/a><\/h3><p>J. Alam, and V. Gupta, \u00ab CRIM\u2019s System Description for the Third Edition of DIHARD Challenge 2020 \u00bb, in The Third DIHARD Speech Diarization Challenge Workshop, January 23, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.springerprofessional.de\/en\/investigating-design-anti-pattern-and-design-pattern-mutations-a\/18772540\"rel=\"nofollow\">Investigating Design Anti-pattern and Design Pattern Mutations and Their Change- and Fault-proneness<\/a><\/h3><p>Z.A. Kermansaravi, M.S. Rahman, F. Khomh, F. Jaafar and Y.-G. Gu\u00e9h\u00e9neuc, \u00ab Investigating Design Anti-pattern and Design Pattern Mutations and Their Change- and Fault-proneness \u00bb in Empirical Software Engineering, Springer, Vol. 26, No. 1, Article 9, 15 janvier 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.mdpi.com\/2673-7418\/1\/1\/4\"rel=\"nofollow\">Train fast while reducing false positives: improving animal classification performance using Convolutional Neural Networks<\/a><\/h3><p>M. Moreni, J. Theau and S. Foucher, \u00ab Train fast while reducing false positives: improving animal classification performance using Convolutional Neural Networks \u00bb, in Geomatics, Vol. 1, pp. 34-49, 15 janvier 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/docs.ogc.org\/per\/20-015r2.html\"rel=\"nofollow\">OGC Testbed-16: Data Access and Processing Engineering Report<\/a><\/h3><p>P. Vretanos, and al., \u00ab OGC Testbed-16: Data Access and Processing Engineering Report \u00bb, OGC Public Engineering Report, OGC 20-016, January 13, 2021.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/itea4.org\/project\/workpackage\/document\/download\/6919\/IVVES_Deliverable_D2.2_Training_Data_Quality_V1.0.pdf\"rel=\"nofollow\">Training Data Quality<\/a><\/h3><p>H. P\u00f6l\u00f6nen and al., \u00ab Training Data Quality\u00a0 \u00bb, IVVES Project, Deliverable 2.2, 52 pages, December 31, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/itea4.org\/project\/workpackage\/document\/download\/6924\/IVVES_Deliverable_D3.2_Validation_methods_and_techniques%20_V1.0.pdf\"rel=\"nofollow\">Validation methods and techniques for evolving systems considering use case requirements<\/a><\/h3><p>O. Nguena Timo, A. Petrenko and al., \u00ab Validation methods and techniques for evolving systems considering use case requirements \u00bb, IVVES Project, Deliverable 3.2, 55 pages, December 21, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/savoirs.usherbrooke.ca\/handle\/11143\/17855\"rel=\"nofollow\">Identification des probl\u00e8mes phytosanitaires de la vigne au sein de la parcelle : association de l\u2019imagerie \u00e0 ultra-haute r\u00e9solution spatiale et de l\u2019apprentissage profond<\/a><\/h3><p>J. Boulent, \u00ab Identification des probl\u00e8mes phytosanitaires de la vigne au sein de la parcelle : association de l\u2019imagerie \u00e0 ultra-haute r\u00e9solution spatiale et de l\u2019apprentissage profond \u00bb. Th\u00e8se de doctorat (Ph. D.), Universit\u00e9 de Sherbrooke, 18 d\u00e9cembre 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9286479\"rel=\"nofollow\">New Interferometric Phase Unwrapping Method Based on Energy Minimization From Contextual Modeling<\/a><\/h3><p>A. Tlili, F. Cavayas, S. Foucher and G. L. Siles, \u00ab New Interferometric Phase Unwrapping Method Based on Energy Minimization From Contextual Modeling \u00bb, in IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Volume 13, pp. 6524-6532, December 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/aclanthology.org\/2020.coling-main.516\/\"rel=\"nofollow\">The Indigenous Languages Technology Project at NRC Canada: an empowerment-oriented approach to developing language software<\/a><\/h3><p>R. Kuhn and al., \u00ab The Indigenous Languages Technology Project at NRC Canada: an empowerment-oriented approach to developing language software \u00bb, in Proceedings of the 28th International Conference on Computational Linguistics (COLING 2020), December 8-13, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2020.564878\/full\"rel=\"nofollow\">Automatic Detection of Flavescence Dor\u00e9e Symptoms Across White Grapevine Varieties Using Deep Learning<\/a><\/h3><p>J. Boulent, P.L. St-Charles, S. Foucher and J. Th\u00e9au, \u00ab Automatic Detection of Flavescence Dor\u00e9e Symptoms Across White Grapevine Varieties Using Deep Learning \u00bb, in Frontiers in Artificial Intelligence, Vol. 3, 96 p., November 30,\u00a0 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/dcase.community\/documents\/challenge2020\/technical_reports\/DCASE2020_Alam_102_t2.pdf\"rel=\"nofollow\">An Ensemble Approach to Unsupervised Anomalous Sound Detection<\/a><\/h3><p>J. Alam, G. Boulianne, V. Gupta and F. Abderrahim, \u00ab An Ensemble Approach to Unsupervised Anomalous Sound Detection \u00bb in DCASE 2020 Unsupervised Detection of Anomalous Sounds for Machine Condition Monitoring Challenge, Novembre 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.researchgate.net\/publication\/345141986_A_Multi-condition_Training_Strategy_for_Countermeasures_Against_Spoofing_Attacks_to_Speaker_Recognizers\"rel=\"nofollow\">A Multi-condition Training Strategy for Countermeasures Against Spoofing Attacks to Speaker Recognizers<\/a><\/h3><p>J. Montiero, J. Alam, and T. Falk, &#8220;A Multi-condition Training Strategy for Countermeasures Against Spoofing Attacks to Speaker Recognizers&#8221;, in Speaker and Language Recognition Workshop (Odyssey 2020), Tokyo, Japan, November, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/www.fit.vutbr.cz\/research\/groups\/speech\/publi\/2020\/alam_odyssey2020_73.pdf\"rel=\"nofollow\">Analysis of ABC Submission to NIST SRE 2019 CMN and VAST Challenge<\/a><\/h3><p>J. Alam, G. Boulianne, and al., &#8220;Analysis of ABC Submission to NIST SRE 2019 CMN and VAST Challenge&#8221;, in Speaker and Language Recognition Workshop (Odyssey 2020), Tokyo, Japan, November, 2020, pp. 289-295.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/arxiv.org\/abs\/2010.13665#:~:text=An%20Approach%20to%20Evaluating%20Learning%20Algorithms%20for%20Decision%20Trees,-Tianqi%20Xiao%2C%20Omer&#038;text=Learning%20algorithms%20produce%20software%20models,the%20medical%20and%20the%20aeronautics.\"rel=\"nofollow\">An Approach to Evaluating Learning Algorithms for Decision Trees<\/a><\/h3><p>T. Xiao, O. Nguena-Timo, F. Avellaneda, Y. Malik, S. D. Bruda, \u00ab An Approach to Evaluating Learning Algorithms for Decision Trees \u00bb, arXiv:2010.13665, 19 p., 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/astesj.com\/v05\/i05\/p155\/#1477470909a457-e8a09e7fb-fcb1\"rel=\"nofollow\">A Circular Invariant Convolution Model-Based Mapping for Multimodal Change Detection<\/a><\/h3><p>R. Touati, M. Mignotte and M. Dahmane, \u00ab A Circular Invariant Convolution Model-Based Mapping for Multimodal Change Detection \u00bb, in Advances in Science, Technology and Engineering Systems Journal, Vol. 5, No. 5, pp. 1288-1298, October 26, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/docs.opengeospatial.org\/per\/20-045.html\"rel=\"nofollow\">OGC Earth Observation Applications Pilot: CRIM Engineering Report<\/a><\/h3><p>T. Landry, F. Charette-Migneault, M. Beaulieu, M. Provencher, L.-D. Perron, D. Byrns and S. Foucher, \u00ab OGC Earth Observation Applications Pilot: CRIM Engineering Report \u00bb, OGC Public Engineering Report, OGC 20-045, October 26, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.isca-speech.org\/archive_v0\/Interspeech_2020\/pdfs\/1485.pdf\"rel=\"nofollow\">SdSV Challenge 2020: Large-Scale Evaluation of Short\u2010Duration Speaker Verification<\/a><\/h3><p>H. Zeinali, K. A. Lee, J. Alam, and L. Burget, \u00ab SdSV Challenge 2020: Large-Scale Evaluation of Short\u2010Duration Speaker Verification \u00bb, in INTERSPEECH 2020, Shanghai, Chine, October 25-29, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9222229\"rel=\"nofollow\">A Study of Inductive Biases for Unsupervised Speech Representation Learning<\/a><\/h3><p>G. Boulianne, &#8220;A Study of Inductive Biases for Unsupervised Speech Representation Learning&#8221;, in IEEE\/ACM Transactions on Acoustics, Speech and Language Processing, Vol. 28, pp. 2781-2795, October 13, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/dihardchallenge.github.io\/dihard3\/system_descriptions\/dihard3_system_description_team7.pdf\"rel=\"nofollow\">CRIM&#8217;s Automatic Speech Recognition and Speech Activity Detection Systems Description for the 2020 edition of NIST Open Speech Analytic Technologies Evaluation<\/a><\/h3><p>V. Gupta, J. Alam, G. Boulianne, \u00ab CRIM&#8217;s Automatic Speech Recognition and Speech Activity Detection Systems Description for the 2020 edition of NIST Open Speech Analytic Technologies Evaluation \u00bb in OpenSAT 2020 Evaluation Workshop, USA, September 16, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0885230820300966?via%3Dihub\"rel=\"nofollow\">On the Use of Blind Channel Response Estimation and a Residual Neural Network to Detect Physical Access Attacks to Speaker Verification Systems<\/a><\/h3><p>A. R. Avila, J. Alam, F. O. Costa Prado, D. O\u2019Shaughnessy, and T. H. Falk, &#8220;On the Use of Blind Channel Response Estimation and a Residual Neural Network to Detect Physical Access Attacks to Speaker Verification Systems&#8221; in Computer Speech &amp; Language Journal, Vol. 66, March 2021 (first online October 20, 2020).<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0885230820300292\"rel=\"nofollow\">Generalized End-to-End Detection of Spoofing Attacks to Automatic Speaker Recognizers<\/a><\/h3><p>J. Montiero, J, Alam, and T. Falk, &#8220;Generalized End-to-End Detection of Spoofing Attacks to Automatic Speaker Recognizers&#8221;, Special issue of Computer Speech &amp; Language Journal, Vol. 63, September, 2020, Article 101096.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/matheo.uliege.be\/handle\/2268.2\/10623\"rel=\"nofollow\">Identifying African Mammal Species in Aerial Images With Object Detection Algorithms<\/a><\/h3><p>A. Delplanque, \u00ab Identifying African Mammal Species in Aerial Images With Object Detection Algorithms \u00bb. M\u00e9moire de ma\u00eetrise, Universit\u00e9 de Li\u00e8ge, Belgique, Septembre 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/espace.etsmtl.ca\/id\/eprint\/2621\/\"rel=\"nofollow\">Unsupervised Speech Representation Learning<\/a><\/h3><p>G. Boulianne, \u00ab Unsupervised Speech Representation Learning \u00bb. Th\u00e8se doctorat (Ph. D.), \u00c9cole de Technologie Sup\u00e9rieure, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9251204\"rel=\"nofollow\">Demystifying the Cyber Attribution: An Exploratory Study<\/a><\/h3><p>F. Jaafar, F. Avellaneda, and E.-H. Alikacem, &#8220;Demystifying the Cyber Attribution: An Exploratory Study&#8221; in IEEE Cyber Science and Technology Congress (CyberSciTech 2020), August 18-24, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9251153\"rel=\"nofollow\">Behavioral Study of Malware Affecting Financial Institutions and Clients<\/a><\/h3><p>R. Mishra, S. Butakov, F. Jaafar, and N. Memon, &#8220;Behavioral Study of Malware Affecting Financial Institutions and Clients&#8221; in IEEE Cyber Science and Technology Congress (CyberSciTech 2020), August 18-24, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.researchgate.net\/publication\/342787881_A_short_description_of_the_solver_EvalMaxSAT\"rel=\"nofollow\">A short description of the solver EvalMaxSAT<\/a><\/h3><p>F. Avellaneda, &#8220;A short description of the solver EvalMaxSAT&#8221;, in MaxSAT Evaluation 2020 (MSE 2020),\u00a0pp. 8-9, Alghero, Italy, July 5-9 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/arxiv.org\/abs\/2002.09469v4\"rel=\"nofollow\">An End-to-End Approach for the Verification Problem: Learning The Right Distance<\/a><\/h3><p>J. Monteiro, I. Albuquerque, J. Alam, D. Hjelm, T. Falk, and C. Jacques, &#8220;An End-to-End Approach for the Verification Problem: Learning The Right Distance&#8221;, in 37th International Conference on Machine Learning (ICML 2020), July, 12-18, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3387940.3392197\"rel=\"nofollow\">A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality Perspective<\/a><\/h3><p>M. Santos, F. Jafaar, B. Minetto Napole\u00e3o, F. Petrillo, and D. Ameyed, &#8220;A Preliminary Systematic Mapping on Software Engineering for Robotic Systems: A Software Quality Perspective&#8221;, IEEE\/ACM 42nd International Conference on Software Engineering Workshops (ICSEW&#8217;20), June 2020, pp. 647\u2013654.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9179414\"rel=\"nofollow\">Study of Security Issues in Platform-as-a-Service (PaaS) Cloud Model<\/a><\/h3><p>F. Jaafar, W. Isharufe, and S. Butakov, &#8220;Study of Security Issues in Platform-as-a-Service (PaaS) Cloud Model&#8221;, in IEEE 2nd International Conference on Electrical, Communication and Computer Engineering (ICECCE 2020), Istanbul, Turquie, June 12-13, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9179227\"rel=\"nofollow\">Securing the Authentication Process of LTE Base Stations<\/a><\/h3><p>A. B. Seyi, F. Jafaar, and R. Ruhl, &#8220;Securing the Authentication Process of LTE Base Stations&#8221;, in IEEE 2nd International Conference on Electrical, Communication and Computer Engineering (ICECCE 2020), Istanbul, Turquie, June 12-13, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/fr\/publications\/the-indigenous-languages-technology-project-at-nrc-canada-an-empowerment-oriented-approach-to-developing-language-software\/\"rel=\"nofollow\">The Indigenous Languages Technology Project at NRC Canada: an empowerment-oriented approach to developing language software<\/a><\/h3><p>R. Kuhn and al., &#8220;The Indigenous Languages Technology Project at NRC Canada: an empowerment-oriented approach to developing language software&#8221;, NRC Publication, June, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s41233-020-00036-z\"rel=\"nofollow\">On the Use of the I-vector Speech Representation for Instrumental Quality Measurement<\/a><\/h3><p>A. R. Avila, J. Alam, D. O\u2019Shaughnessy, and T. Falk, &#8220;On the Use of the I-vector Speech Representation for Instrumental Quality Measurement&#8221; in Quality and User Experience Journal, Springer, Volume 5, Number 6, June, 2020, pp. 1-14.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9054558\/\"rel=\"nofollow\">An Ensemble Based Approach for Generalized Detection of Spoofing Attacks to Automatic Speaker Recognizers<\/a><\/h3><p>J. Monteiro, J. Alam, and T. Falk, &#8220;An Ensemble Based Approach for Generalized Detection of Spoofing Attacks to Automatic Speaker Recognizers&#8221;, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2020). pp. 6599-6603, Barcelona, Spain, May 4-8, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/www.lrec-conf.org\/proceedings\/lrec2020\/pdf\/2020.lrec-1.307.pdf\"rel=\"nofollow\">Automatic Transcription Challenges for Inuktitut, a Low-Resource Polysynthetic Language<\/a><\/h3><p>V. Gupta and G. Boulianne, \u201cAutomatic Transcription Challenges for Inuktitut, a Low-Resource Polysynthetic Language\u201d, in Proceedings of the 12th Language Resources and Evaluation Conference (LREC 2020), pp. 2521-2527, May, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/aclanthology.org\/2020.lrec-1.438\/\"rel=\"nofollow\">On the Performance of Time-Pooling Strategies for End-to-End Spoken Language Identification<\/a><\/h3><p>J. Montiero, J. Alam, and T. Falk, &#8220;On the Performance of Time-Pooling Strategies for End-to-End Spoken Language Identification&#8221; in Proceedings of the 12th Language Resources and Evaluation Conference (LREC 2020), pp. 3566-3572,\u00a0May, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"http:\/\/www.lrec-conf.org\/proceedings\/lrec2020\/workshops\/SLTUCCURL\/pdf\/2020.sltuccurl-1.51.pdf\"rel=\"nofollow\">Speech Transcription Challenges for Resource Constrained Indigenous Language Cree<\/a><\/h3><p>V. Gupta and G. Boulianne, \u201cSpeech Transcription Challenges for Resource Constrained Indigenous Language Cree\u201d, in Proceedings of the 1st Joint Workshop on Spoken Language Technologies for Under-resourced languages (SLTU) and Collaboration and Computing for Under-Resourced Languages (CCURL) @LREC 2020, pp. 362\u2013367, May, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/9072517\"rel=\"nofollow\">A Multimodal Non-Intrusive Stress Monitoring from the Pleasure-Arousal Emotional Dimensions<\/a><\/h3><p>M. Dahmane, J. Alam, P. St-Charles, M. Lalonde, K. Heffner and S. Foucher, &#8220;A Multimodal Non-Intrusive Stress Monitoring from the Pleasure-Arousal Emotional Dimensions,&#8221; in IEEE Transactions on Affective Computing, April 20, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.crim.ca\/fr\/publications\/application-des-reseaux-neuronaux-a-convolution-a-lanalyse-des-images-radar-polarimetriques-en-milieu-urbain\/\"rel=\"nofollow\">Application des r\u00e9seaux neuronaux \u00e0 convolution \u00e0 l\u2019analyse des images radar polarim\u00e9triques en milieu urbain<\/a><\/h3><p>M. Beaulieu, \u00ab Application des r\u00e9seaux neuronaux \u00e0 convolution \u00e0 l\u2019analyse des images radar polarim\u00e9triques en milieu urbain \u00bb. M\u00e9moire de Ma\u00eetrise \u00e8s sciences (M. Sc.) en G\u00e9ographie, Universit\u00e9 de Montr\u00e9al, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/www.longdom.org\/open-access\/partly-uncoupled-siamese-model-for-change-detection-from-heterogeneous-remote-sensing-imagery.pdf\"rel=\"nofollow\">Partly Uncoupled Siamese Model for Change Detection from Heterogeneous Remote Sensing Imagery<\/a><\/h3><p>R. Touati, M. Mignotte, and M. Dahmane, &#8220;Partly Uncoupled Siamese Model for Change Detection from Heterogeneous Remote Sensing Imagery&#8221; in Journal of Remote Sensing &amp; GIS, Volume 9, (1), pp. 272, March, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><div class=\"eael-post-list-post \"><div class=\"eael-post-list-post-inner\"><div class=\"eael-post-list-content\"><h3 class=\"eael-post-list-title\"><a href=\"https:\/\/ieeexplore.ieee.org\/document\/8966599\"rel=\"nofollow\">Anomaly Feature Learning for Unsupervised Change Detection in Heterogeneous Images: A Deep Sparse Residual Model<\/a><\/h3><p>R. Touati, M. Mignotte, and M. Dahmane, \u00ab Anomaly Feature Learning for Unsupervised Change Detection in Heterogeneous Images: A Deep Sparse Residual Model \u00bb, in IEEE Journal of Selected Topics in Applied Earth Observations Remote Sensing, Volume 13, pp. 588-600, January 22, 2020.<\/p><div class=\"boxed-meta\"><\/div><\/div><\/div><\/div><\/div><\/div>\n\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>TousActe de conf\u00e9renceLivreP\u00e9riodiqueRapport techniqueTh\u00e8se \/ M\u00e9moire ABC System Description for NIST SRE 2021 Alam, J. et al., &#8220;ABC System Description for NIST SRE 2021&#8221;, NIST SRE 2021 Workshop, 14-16 d\u00e9cembre 2021. Investigation on Instance Mixup Regularization Strategies for Self-supervised Speaker Representation Learning Kang, W., Alam, J., Fathan, A., &#8220;Investigation on Instance Mixup Regularization Strategies for [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":14913,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-793","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/pages\/793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/comments?post=793"}],"version-history":[{"count":111,"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/pages\/793\/revisions"}],"predecessor-version":[{"id":26939,"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/pages\/793\/revisions\/26939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/media\/14913"}],"wp:attachment":[{"href":"https:\/\/www.crim.ca\/fr\/wp-json\/wp\/v2\/media?parent=793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}