Found: 35
Select item for more details and to access through your institution.
Emotion-specific AUs for micro-expression recognition.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 8, p. 22773, doi. 10.1007/s11042-023-16326-5
- By:
- Publication type:
- Article
Data-driven photocatalytic degradation activity prediction with Gaussian process.
- Published in:
- Process Safety & Environmental Protection: Transactions of the Institution of Chemical Engineers Part B, 2022, v. 161, p. 848, doi. 10.1016/j.psep.2022.03.020
- By:
- Publication type:
- Article
Deepfake attribution: On the source identification of artificially generated images.
- Published in:
- WIREs: Data Mining & Knowledge Discovery, 2022, v. 12, n. 3, p. 1, doi. 10.1002/widm.1438
- By:
- Publication type:
- Article
Cube attacks on round-reduced TinyJAMBU.
- Published in:
- Scientific Reports, 2022, v. 12, n. 1, p. 1, doi. 10.1038/s41598-022-09004-3
- By:
- Publication type:
- Article
Invisible emotion magnification algorithm (IEMA) for real-time micro-expression recognition with graph-based features.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 7, p. 9151, doi. 10.1007/s11042-021-11625-1
- By:
- Publication type:
- Article
Faceless identification based on temporal strips.
- Published in:
- Multimedia Tools & Applications, 2021, v. 80, n. 1, p. 279, doi. 10.1007/s11042-020-09391-7
- By:
- Publication type:
- Article
FACS-Based Graph Features for Real-Time Micro-Expression Recognition.
- Published in:
- Journal of Imaging, 2020, v. 6, n. 12, p. 1, doi. 10.3390/jimaging6120130
- By:
- Publication type:
- Article
Cryptanalysis of genetic algorithm-based encryption scheme.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 35/36, p. 25259, doi. 10.1007/s11042-020-09191-z
- By:
- Publication type:
- Article
Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 11, p. N.PAG, doi. 10.1002/cpe.5048
- By:
- Publication type:
- Article
Separable authentication in encrypted HEVC video.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 18, p. 24165, doi. 10.1007/s11042-018-5611-7
- By:
- Publication type:
- Article
Planting attack on latent fingerprints.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2018, v. 7, n. 5, p. 396, doi. 10.1049/iet-bmt.2016.0113
- By:
- Publication type:
- Article
A Survey of Automatic Facial Micro-Expression Analysis: Databases, Methods, and Challenges.
- Published in:
- Frontiers in Psychology, 2018, p. N.PAG, doi. 10.3389/fpsyg.2018.01128
- By:
- Publication type:
- Article
SPRING: a novel parallel chaos-based image encryption scheme.
- Published in:
- Nonlinear Dynamics, 2018, v. 92, n. 2, p. 575, doi. 10.1007/s11071-018-4076-6
- By:
- Publication type:
- Article
Effective recognition of facial micro-expressions with video motion magnification.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 20, p. 21665, doi. 10.1007/s11042-016-4079-6
- By:
- Publication type:
- Article
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification.
- Published in:
- Wireless Personal Communications, 2016, v. 88, n. 3, p. 685, doi. 10.1007/s11277-016-3192-1
- By:
- Publication type:
- Article
Android based self-diagnostic electrocardiogram system for mobile healthcare.
- Published in:
- 2015
- By:
- Publication type:
- journal article
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map.
- Published in:
- Nonlinear Dynamics, 2015, v. 80, n. 3, p. 1483, doi. 10.1007/s11071-015-1956-x
- By:
- Publication type:
- Article
Efficient Spatio-Temporal Local Binary Patterns for Spontaneous Facial Micro-Expression Recognition.
- Published in:
- PLoS ONE, 2015, v. 10, n. 5, p. 1, doi. 10.1371/journal.pone.0124674
- By:
- Publication type:
- Article
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme.
- Published in:
- Scientific World Journal, 2015, v. 2015, p. 1, doi. 10.1155/2015/237514
- By:
- Publication type:
- Article
Cryptanalysis of a certificateless identification scheme.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 122, doi. 10.1002/sec.963
- By:
- Publication type:
- Article
Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards.
- Published in:
- Nonlinear Dynamics, 2015, v. 79, n. 2, p. 809, doi. 10.1007/s11071-014-1704-7
- By:
- Publication type:
- Article
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2014, v. 11, n. 5, p. 467, doi. 10.1109/TDSC.2013.51
- By:
- Publication type:
- Article
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 7, p. 2532, doi. 10.3837/tiis.2014.07.019
- By:
- Publication type:
- Article
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/170906
- By:
- Publication type:
- Article
Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
- Published in:
- 2014
- By:
- Publication type:
- journal article
Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems.
- Published in:
- Journal of Medical Systems, 2013, v. 37, n. 6, p. 1, doi. 10.1007/s10916-013-9993-9
- By:
- Publication type:
- Article
Cheating Resistance of a Secure Incentive Protocol for Mobile Ad Hoc Networks.
- Published in:
- Wireless Personal Communications, 2012, v. 67, n. 4, p. 803, doi. 10.1007/s11277-011-0410-8
- By:
- Publication type:
- Article
Efficient encryption with keyword search in mobile networks.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 12, p. 1412, doi. 10.1002/sec.505
- By:
- Publication type:
- Article
Security models for delegated keyword searching within encrypted contents.
- Published in:
- Journal of Internet Services & Applications, 2012, v. 3, n. 2, p. 233, doi. 10.1007/s13174-012-0063-1
- By:
- Publication type:
- Article
Analyzing the Secure Simple Pairing in Bluetooth v4.0.
- Published in:
- Wireless Personal Communications, 2012, v. 65, n. 4, p. 719, doi. 10.1007/s11277-010-0215-1
- By:
- Publication type:
- Article
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 1, p. 69, doi. 10.1007/s11277-010-0001-0
- By:
- Publication type:
- Article
Non-repudiable authentication and billing architecture for wireless mesh networks.
- Published in:
- Wireless Networks (10220038), 2011, v. 17, n. 4, p. 1055, doi. 10.1007/s11276-011-0334-y
- By:
- Publication type:
- Article
On the security of ownership watermarking of digital images based on singular value decomposition.
- Published in:
- Journal of Electronic Imaging, 2011, v. 20, n. 1, p. 010501, doi. 10.1117/1.3534865
- By:
- Publication type:
- Article
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
- Published in:
- Wireless Personal Communications, 2011, v. 56, n. 1, p. 73, doi. 10.1007/s11277-009-9876-z
- By:
- Publication type:
- Article
On the security of the WinRAR encryption feature.
- Published in:
- International Journal of Information Security, 2006, v. 5, n. 2, p. 115, doi. 10.1007/s10207-006-0086-3
- By:
- Publication type:
- Article