Author of the publication

An End-To-End Non-Intrusive Model for Subjective and Objective Real-World Speech Assessment Using a Multi-Task Framework.

, , , and . ICASSP, page 316-320. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A dynamic geographic hash table for data-centric storage in sensor networks., , , and . WCNC, page 2168-2174. IEEE, (2006)Robust object tracking in the X-Z domain., , and . MFI, page 499-504. IEEE, (2016)Concurrent Access Control Using Subcarrier Signature in Heterogeneous MIMO-Based WLAN., , , , , and . MACOM, volume 7642 of Lecture Notes in Computer Science, page 109-121. Springer, (2012)Pattern mutation in wireless sensor deployment., , , , and . IEEE/ACM Trans. Netw., 20 (6): 1964-1977 (2012)Integrated routing algorithms for anycast messages., , and . IEEE Commun. Mag., 38 (1): 48-53 (2000)A Routing Protocol for Anycast Messages., , , and . IEEE Trans. Parallel Distributed Syst., 11 (6): 571-588 (2000)MosaicOS: A Simple and Effective Use of Object-Centric Images for Long-Tailed Object Detection., , , , , , , and . ICCV, page 407-417. IEEE, (2021)Long-Term SNR Estimation Using Noise Residuals and a Two-Stage Deep-Learning Framework., and . LVA/ICA, volume 10891 of Lecture Notes in Computer Science, page 351-360. Springer, (2018)Modeling and Detection of Camouflaging Worm, , , , and . IEEE Transactions on Dependable and Secure Computing, (2010)Turning heterogeneity into an advantage in wireless ad-hoc network routing., , and . Ad Hoc Networks, 8 (1): 108-118 (2010)