From post

Automatic Micro-expression Recognition from Long Video Using a Single Spotted Apex.

, , , и . ACCV Workshops (2), том 10117 из Lecture Notes in Computer Science, стр. 345-360. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sparsity in Dynamics of Spontaneous Subtle Emotions: Analysis & Application., , и . CoRR, (2016)Cryptanalysis of the application secure alternative to SNMP (APSSNMP).. Comput. Stand. Interfaces, 31 (1): 63-65 (2009)Cryptanalysis of e-mail protocols providing perfect forward secrecy.. Comput. Stand. Interfaces, 30 (3): 101-105 (2008)On the security of the WinRAR encryption feature., и . Int. J. Inf. Sec., 5 (2): 115-123 (2006)Related-Key Attacks on Triple-DES and DESX Variants.. CT-RSA, том 2964 из Lecture Notes in Computer Science, стр. 15-24. Springer, (2004)Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme., и . ACNS, том 3531 из Lecture Notes in Computer Science, стр. 33-39. (2005)Security Models for Heterogeneous Networking., , , и . SECRYPT, стр. 318-321. SciTePress, (2010)On Hashing with Tweakable Ciphers., и . ICC, стр. 1-5. IEEE, (2009)Further attacks and comments on 'security of two remote user authentication schemes using smart cards'., и . IEEE Trans. Consumer Electronics, 50 (2): 609-611 (2004)Cryptanalysis of some improved password-authenticated key exchange schemes., , и . Comput. Commun., 29 (15): 2822-2829 (2006)