Line 20: | Line 20: | ||
{| width="100%" valign="top" | {| width="100%" valign="top" | ||
− | !style="vertical-align: top; text-align: left; width:50%;" | + | !style="vertical-align: top; text-align: left; width:50%;" |
− | + | |{{Project2|logo=logo-suspect.png | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
| shorttitle=SUSPECT | | shorttitle=SUSPECT | ||
| title=SUSPECT (SecUre SPEeCh Technologies) | | title=SUSPECT (SecUre SPEeCh Technologies) | ||
| date=2012-2015 | | date=2012-2015 | ||
| information= The goal of this project is to develop privacy-preserving frameworks for processing voice data. Processing will be performed without having access to the voice, i.e., access to any form of the speech that can be analyzed to obtain information about the talker or what they spoke. Using a combination of tools from cryptography and secure-multiparty computation we will render voice processing algorithms secure, so that the privacy of all parties is preserved. We specifically propose to develop solutions for secure speaker verification and keyword spotting problems.}} | | information= The goal of this project is to develop privacy-preserving frameworks for processing voice data. Processing will be performed without having access to the voice, i.e., access to any form of the speech that can be analyzed to obtain information about the talker or what they spoke. Using a combination of tools from cryptography and secure-multiparty computation we will render voice processing algorithms secure, so that the privacy of all parties is preserved. We specifically propose to develop solutions for secure speaker verification and keyword spotting problems.}} | ||
+ | !style="vertical-align: top; text-align: left;" |{{Project2|logo=logo-voce.png | ||
+ | | shorttitle=VOCE | ||
+ | | title= De-identification for privacy protection in multimedia content | ||
+ | | date=2013-2017 | ||
+ | | information= De-identification in multimedia content can be defined as the process of concealing the identities of individuals captured in a given set of data (images, video, audio, text), for the purpose of protecting their privacy. This Action aims to facilitate coordinated interdisciplinary efforts (related to scientific, legal, ethical and societal aspects) in the introduction of person de-identification and reversible de-identification in multimedia content. [http://costic1206.uvigo.es/]}} | ||
|} | |} | ||
Line 62: | Line 58: | ||
* [http://www.vithea.org VITHEA] - Virtual Therapist for Aphasia treatment (2010-2012) | * [http://www.vithea.org VITHEA] - Virtual Therapist for Aphasia treatment (2010-2012) | ||
+ | * [https://avoz.l2f.inesc-id.pt AVOZ] - Models for automatic speech recognition for the Elderly (2012-2013) | ||
+ | * [PoSTPort] POrting Speech Technologies to other varieties of Portuguese (2008-2010) | ||
* [https://www.l2f.inesc-id.pt/wiki/index.php/OOBIAN_%28%29 OBIAN] Lexical and grammatical resources for recognizing syntactic-semantic relationships on text (2010-2012) | * [https://www.l2f.inesc-id.pt/wiki/index.php/OOBIAN_%28%29 OBIAN] Lexical and grammatical resources for recognizing syntactic-semantic relationships on text (2010-2012) | ||
* [FalaComigo] - Enhance the Cultural Tourism through the Interaction with Virtual Characters (2010-2013) | * [FalaComigo] - Enhance the Cultural Tourism through the Interaction with Virtual Characters (2010-2013) |
|
|
---|
style="vertical-align: top; text-align: left; width:50%;" |
|
|
---|