|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 76 occurrences of 58 keywords
|
|
|
Results
Found 253 publication records. Showing 253 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
147 | Chetan Parampalli, R. Sekar 0001, Rob Johnson |
A practical mimicry attack against powerful system-call monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 156-167, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
system-call monitor, intrusion-detection, buffer overflow, memory error, mimicry attack |
96 | Lauren E. Scissors, Alastair J. Gill, Darren Gergle |
Linguistic mimicry and trust in text-based CMC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, San Diego, CA, USA, November 8-12, 2008, pp. 277-280, 2008, ACM, 978-1-60558-007-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
lexical mimicry, trusting language, trust, instant messaging (im), social dilemma, rapport |
89 | Sufatrio, Roland H. C. Yap |
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 146-164, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Simon P. Chung, Aloysius K. Mok |
On Random-Inspection-Based Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 8th International Symposium, RAID 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers, pp. 165-184, 2005, Springer, 3-540-31778-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
random inspection, intrusion detection, computer security, Mimicry attacks |
72 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada, pp. 213-223, 2008, IEEE Computer Society, 978-0-7695-3390-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi |
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 213-230, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
72 | Fernando Godínez, Dieter Hutter, Raúl Monroy |
On the Use of Word Networks to Mimicry Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 423-435, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | David A. Wagner 0001, Paolo Soto |
Mimicry attacks on host-based intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 255-264, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
anomaly detection, host-based intrusion detection, evasion attacks |
69 | Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood |
Evolving Buffer Overflow Attacks with Detector Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoWorkshops ![In: Applications of Evolutinary Computing, EvoWorkshops 2007: EvoCoMnet, EvoFIN, EvoIASP,EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog, Valencia, Spain, April11-13, 2007, Proceedings., pp. 11-20, 2007, Springer, 978-3-540-71804-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
54 | Hiroaki Ogata, Chengjiu Yin, Yoneo Yano |
JAMIOLAS: Supporting Japanese Mimicry and Onomatopoeia Learning with Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMTE ![In: 4th IEEE International Workshop on Wireless and Mobile Technologies in Education, WMTE 2006, Athens, Greece, November 16-17, 2006, pp. 111-115, 2006, IEEE Computer Society, 0-7695-2723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Debin Gao, Michael K. Reiter, Dawn Xiaodong Song |
Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 6(2), pp. 96-110, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Veljko Potkonjak, Jelena Radojicic, Spyros G. Tzafestas |
Modeling Robot "Psycho-Physical" State and Reactions - A New Option in Human-Robot Communication Part 1: Concept and Background. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 35(4), pp. 339-352, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
psycho-physical state, gestural language, robot fatigue, redundancy, humanoids, human-robot communication |
44 | Roman V. Yampolskiy |
Mimicry Attack on Strategy-Based Behavioral Biometric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 916-921, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Biometric, Behavior, Poker, Spoofing, Mimicry |
44 | Nicole C. Krämer, Nina Simons, Stefan Kopp |
The Effects of an Embodied Conversational Agent's Nonverbal Behavior on User's Evaluation and Behavioral Mimicry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVA ![In: Intelligent Virtual Agents, 7th International Conference, IVA 2007, Paris, France, September 17-19, 2007, Proceedings, pp. 238-251, 2007, Springer, 978-3-540-74996-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
social effects of ECAs, Evaluation, nonverbal behavior, mimicry |
44 | Duncan Sanderson |
Technology Design and Mimicry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Designing Interactive Systems ![In: Proceedings of the 2nd Conference on Designing Interactive Systems: Processes, Practices, Methods and Techniques, DIS 1997, Grand Hotel Krasnapolsky, Amsterdam, the Netherlands, August 18-20, 1997, pp. 311-313, 1997, ACM, 0-89791-863-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
case study, technology design, mimicry |
42 | Boram Lee, Woohun Lee |
Cheese cam: unconscious interaction between humans and a digital camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009, pp. 4285-4290, 2009, ACM, 978-1-60558-247-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
facial expression mimicry, mirror neuron theory, unconscious interaction, interaction technique |
42 | Lap-Chung Lam, Tzi-cker Chiueh |
Automatic Extraction of Accurate Application-Specific Sandboxing Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 1-20, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack |
40 | Vijay Solanki, Alessandro Vinciarelli, Jane Stuart-Smith, Rachel Smith |
Measuring mimicry in task-oriented conversations: degree of mimicry is related to task difficulty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERSPEECH ![In: INTERSPEECH 2015, 16th Annual Conference of the International Speech Communication Association, Dresden, Germany, September 6-10, 2015, pp. 1815-1819, 2015, ISCA. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
37 | Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi |
An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 418-425, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Kuo-Yuan Hwa, Wan-Man Lin, Yung-I Hou, Trai-Ming Yeh |
Molecular Mimicry between SARS Coronavirus Spike Protein and Human Protein. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FBIT ![In: Frontiers in the Convergence of Bioscience and Information Technologies 2007, FBIT 2007, Jeju Island, Korea, October 11-13, 2007, pp. 294-298, 2007, IEEE Computer Society, 978-0-7695-2999-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Ke Wang 0009, Janak J. Parekh, Salvatore J. Stolfo |
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 226-248, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
Automated Discovery of Mimicry Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings, pp. 41-60, 2006, Springer, 3-540-39723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IDS evaluation, model-based anomaly detection, model checking, attacks |
37 | Haizhi Xu, Wenliang Du, Steve J. Chapin |
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 21-38, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Amy Ashurst Gooch, Jeremy Long, Li Ji 0001, Anthony Estey, Bruce Gooch |
Viewing progress in non-photorealistic rendering through Heinlein's lens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPAR ![In: 8th International Symposium on Non-Photorealistic Animation and Rendering, NPAR 2010, Annecy, France, June 7-10, 2010, Proceedings, pp. 165-171, 2010, ACM, 978-1-4503-0125-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
meta-paper, non-photorealistic rendering, grand challenges |
34 | Mohsen Davoudi, Mehdi Davoudi |
Intelligent Robot Motion using Fuzzy logic-Based CTP and Artificial Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the Firth IEEE International Conference on Cognitive Informatics, ICCI 2006, July 17-19, Beijing, China, pp. 669-674, 2006, IEEE Computer Society, 1-4244-0475-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Ogawa Manabu, Edwards Sarah, Choh Ikuro |
Research of guide system utilizing artificial human shadow: proposal of "S3G shadow support guide system". ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMEA ![In: Proceedings of the Third International Conference on Digital Interactive Media in Entertainment and Arts, DIMEA 2008, 10-12 September 2008, Athens, Greece, pp. 517-518, 2008, ACM, 978-1-60558-248-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
direction with a human shadow, self-learning, mimicry |
24 | David R. Hill |
Speaker Classification Concepts: Past, Present and Future. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Speaker Classification (1) ![In: Speaker Classification I: Fundamentals, Features, and Methods, pp. 21-46, 2007, Springer, 978-3-540-74186-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
voice morphing, socio-phonetics, speech forensics, speech research tools, speech segments, speech prosody, formant sensitivity analysis, dialogue dynamics, gnuspeech, face recognition, rhythm, emotional intelligence, intonation, speaker classification, mimicry, impersonation |
24 | Prahlad Fogla, Wenke Lee |
Evading network anomaly detection systems: formal reasoning and practical techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 59-68, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
polymorphic blending attack, anomaly detection, mimicry attack |
24 | Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood |
On evolving buffer overflow attacks using genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006, pp. 1667-1674, 2006, ACM, 1-59593-186-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection systems, linear genetic programming, mimicry attacks |
20 | Michael Zhang, Kush Bhatia, Hermann Kumbong, Christopher Ré |
The Hedgehog & the Porcupine: Expressive Linear Attentions with Softmax Mimicry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.04347, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Rabimba Karanjai, Weidong Shi |
LookALike: Human Mimicry based collaborative decision making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.10824, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Jun Yu 0001, Wangyuan Zhu, Jichao Zhu |
Efficient Feature Extraction and Late Fusion Strategy for Audiovisual Emotional Mimicry Intensity Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.11757, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Tobias Hallmen, Fabian Deuser, Norbert Oswald, Elisabeth André |
Unimodal Multi-Task Fusion for Emotional Mimicry Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.11879, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Evania L. Fasya, Esther van den Bos, Dirk K. J. Heylen, Mariska E. Kret |
Smile mimicry smoothens human-virtual human interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Hum. Comput. Stud. ![In: Int. J. Hum. Comput. Stud. 183, pp. 103182, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Steven Braun, Martin Mundt, Kristian Kersting |
Deep Classifier Mimicry without Data Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISTATS ![In: International Conference on Artificial Intelligence and Statistics, 2-4 May 2024, Palau de Congressos, Valencia, Spain., pp. 4762-4770, 2024, PMLR. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
20 | Ishan Shah, Akanksha Jain, Calvin Lin |
Effective Mimicry of Bélády's MIN Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 43(4), pp. 45-52, July - August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Boguslaw Pawlowski, Anna Chmielinska |
Kin term mimicry hypothesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Biosci. ![In: Theory Biosci. 142(3), pp. 199-203, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Lijuan Luo, Jiarui Liu, Hanyi Shen, Yuping Lai |
Vote or not? How language mimicry affect peer recognition in an online social Q&A community. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neurocomputing ![In: Neurocomputing 530, pp. 139-149, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yeping Wang, Carter Sifferman, Michael Gleicher |
Exploiting Task Tolerances in Mimicry-based Telemanipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.15839, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng 0001, Rana Hanocka, Ben Y. Zhao |
GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.04222, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Steven Braun, Martin Mundt, Kristian Kersting |
Deep Classifier Mimicry without Data Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.02090, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Haotian Xue, Chumeng Liang, Xiaoyu Wu, Yongxin Chen |
Toward effective protection against diffusion based mimicry through score distillation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.12832, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Kristina Gligoric, Arnaud Chiolero, Emre Kiciman, Ryen W. White, Eric Horvitz, Robert West 0001 |
Food Choice Mimicry on a Large University Campus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.16095, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Johannes Jaeger |
Artificial intelligence is algorithmic mimicry: why artificial "agents" are not (and won't be) proper agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.07515, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ge Luo 0003, Junqiang Huang, Manman Zhang, Zhenxing Qian, Sheng Li 0006, Xinpeng Zhang 0001 |
Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.13619, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Sonali Tayal, Sonika Bhatnagar |
Role of molecular mimicry in the SARS-CoV-2-human interactome for pathogenesis of cardiovascular diseases: An update to ImitateDB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Biol. Chem. ![In: Comput. Biol. Chem. 106, pp. 107919, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Chun-Ting Hsu, Wataru Sato |
Electromyographic Validation of Spontaneous Facial Mimicry Detection Using Automated Facial Action Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(22), pp. 9076, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Jiayu Ye, Yanhong Yu, Gang Fu, Yunshao Zheng, Yang Liu, Yitao Zhu, Qingxiang Wang |
Analysis and Recognition of Voluntary Facial Expression Mimicry Based on Depressed Patients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Biomed. Health Informatics ![In: IEEE J. Biomed. Health Informatics 27(8), pp. 3698-3709, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Rongyu Yu, Burak Kizilkaya, Zhen Meng, Emma Li, Guodong Zhao 0001, Muhammad Ali Imran 0001 |
Robot Mimicry Attack on Keystroke-Dynamics User Identification and Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: IEEE International Conference on Robotics and Automation, ICRA 2023, London, UK, May 29 - June 2, 2023, pp. 9879-9884, 2023, IEEE, 979-8-3503-2365-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yeping Wang, Carter Sifferman, Michael Gleicher |
Exploiting Task Tolerances in Mimicry-Based Telemanipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: IROS, pp. 7012-7019, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Isaac Wang, Rodrigo Calvo, Heting Wang, Jaime Ruiz |
Stop Copying Me: Evaluating nonverbal mimicry in embodied motivational agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVA ![In: Proceedings of the 23rd ACM International Conference on Intelligent Virtual Agents, IVA 2023, Würzburg, Germany, September 19-22, 2023, pp. 49:1-49:4, 2023, ACM, 978-1-4503-9994-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Nora Elizabeth Joby, Hiroyuki Umemuro |
Emotional mimicry as a proxy measurement for pro-social indicators of trust, empathy, liking and altruism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVA ![In: Proceedings of the 23rd ACM International Conference on Intelligent Virtual Agents, IVA 2023, Würzburg, Germany, September 19-22, 2023, pp. 12:1-12:8, 2023, ACM, 978-1-4503-9994-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng 0001, Rana Hanocka, Ben Y. Zhao |
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 2187-2204, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Akul Goyal, Xueyuan Han, Gang Wang 0011, Adam Bates 0001 |
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023, 2023, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Annisa Ristya Rahmanti, Chih-Wei Huang, Muhammad Solihuddin Muhtar, Hsuan-Chia Yang, Yu-Chuan (Jack) Li |
Facial Mimicry and Doctor-Patient Satisfaction: The Feasibility of Artificial Empathy in a Clinical Video Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MedInfo ![In: MEDINFO 2023 - The Future Is Accessible - Proceedings of the 19th World Congress on Medical and Health Informatics, Sydney, NSW, Australia, 8-12 July 2023., pp. 1116-1120, 2023, IOS Press, 978-1-64368-456-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ryan Gardner, Joshua Wilkins, Sejal Mistry, Ramkiran Gouripeddi, Julio C. Facelli |
Structural Homology of Epitope Binding Mimicry in the Onset of Type 1 Diabetes Mellitus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIBM ![In: IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023, Istanbul, Turkiye, December 5-8, 2023, pp. 3708-3713, 2023, IEEE, 979-8-3503-3748-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Gabriel Simmons |
Moral Mimicry: Large Language Models Produce Moral Rationalizations Tailored to Political Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL (student) ![In: Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics: Student Research Workshop, ACL 2023, Toronto, Canada, July 9-14, 2023., pp. 282-297, 2023, Association for Computational Linguistics, 978-1-959429-69-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Ethan Askam, Raja M. Nagisetty, Jeremy Crowley, Andrew L. Bobst, Glenn Shaw, Josephine Fortune |
Satellite and sUAS Multispectral Remote Sensing Analysis of Vegetation Response to Beaver Mimicry Restoration on Blacktail Creek, Southwest Montana. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 14(24), pp. 6199, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Hansaim Lim, Chung-Jung Tsai, Ozlem Keskin, Ruth Nussinov, Attila Gürsoy |
HMI-PRED 2.0: a biologist-oriented web application for prediction of host-microbe protein-protein interaction by interface mimicry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bioinform. ![In: Bioinform. 38(21), pp. 4962-4965, October 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Damla Ovek, Ameer Taweel, Zeynep Abali, Ece Tezsezen, Yunus Emre Koroglu, Chung-Jung Tsai, Ruth Nussinov, Ozlem Keskin, Attila Gürsoy |
SARS-CoV-2 Interactome 3D: A Web interface for 3D visualization and analysis of SARS-CoV-2-human mimicry and interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bioinform. ![In: Bioinform. 38(5), pp. 1455-1457, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Luca Massari, Giulia Fransvea, Jessica D'Abbraccio, Mariangela Filosa, Giuseppe Terruso, Andrea Aliperta, Giacomo D'Alesio, Martina Zaltieri, Emiliano Schena, Eduardo Palermo, Edoardo Sinibaldi, Calogero Maria Oddo |
Functional mimicry of Ruffini receptors with fibre Bragg gratings and deep neural networks enables a bio-inspired large-area tactile-sensitive skin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nat. Mach. Intell. ![In: Nat. Mach. Intell. 4(5), pp. 425-435, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Luca Massari, Giulia Fransvea, Jessica D'Abbraccio, Mariangela Filosa, Giuseppe Terruso, Andrea Aliperta, Giacomo D'Alesio, Martina Zaltieri, Emiliano Schena, Eduardo Palermo, Edoardo Sinibaldi, Calogero Maria Oddo |
Functional mimicry of Ruffini receptors with Fiber Bragg Gratings and Deep Neural Networks enables a bio-inspired large-area tactile sensitive skin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.12752, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Sahar Al Ajmi, Khizar Hayat 0002, Alaa M. Al-Obaidi, Naresh Kumar, Munaf Najmuldeen, Baptiste Magnier |
Speech Forensics: Blind Voice Mimicry Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.12573, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino |
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.03014, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Gabriel Simmons |
Moral Mimicry: Large Language Models Produce Moral Rationalizations Tailored to Political Identity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.12106, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | J. Waghorne, C. Howard, H. Hu, J. Pang, W. J. Peveler, L. Harris, Olga Barrera |
The applicability of transperceptual and deep learning approaches to the study and mimicry of complex cartilaginous tissues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.14314, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Muhterem Dindar, Sanna Järvelä, Sara Ahola, Xiaohua Huang, Guoying Zhao 0001 |
Leaders and Followers Identified by Emotional Mimicry During Collaborative Learning: A Facial Expression Recognition Study on Emotional Valence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Affect. Comput. ![In: IEEE Trans. Affect. Comput. 13(3), pp. 1390-1400, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Noor Rahman, Sara Begum, Asifullah Khan, Sahib Gul Afridi, Muhammad Umar Khayam Sahibzada, Banan Atwah, Zain Alhindi, Haroon Khan |
An insight in Salmonella typhi associated autoimmunity candidates' prediction by molecular mimicry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Biol. Medicine ![In: Comput. Biol. Medicine 148, pp. 105865, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Qinchen Gu, David Formby, Shouling Ji, Brendan Saltaformaggio, Anu G. Bourgeois, Raheem Beyah |
This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(5), pp. 3218-3230, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Ishan Shah, Akanksha Jain, Calvin Lin |
Effective Mimicry of Belady's MIN Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: IEEE International Symposium on High-Performance Computer Architecture, HPCA 2022, Seoul, South Korea, April 2-6, 2022, pp. 558-572, 2022, IEEE, 978-1-6654-2027-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Noa Reijnen, Debby Damen, Hendrik Engelbrecht |
Walking in or Talking with Others' Shoes: Studying the Role of Perspective Getting and Mimicry on Interlocutors' Interpersonal Accuracy and Feelings of Empathy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 44th Annual Meeting of the Cognitive Science Society, CogSci 2022, Toronto, ON, Canada, July 27-30, 2022, 2022, cognitivesciencesociety.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
20 | Gordana Lastovicka-Medin, Matija Deretic, Tijana Cvijetic, Ksenija Vesovic |
Magneto-mimicry & Body movement tracing by magnetic sensors, phone as DAQ and Phyphox as the sensor data base, browser and graphical analyzer: Case study of repetitive and irregular pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MECO ![In: 11th Mediterranean Conference on Embedded Computing, MECO 2022, Budva, Montenegro, June 7-10, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-6828-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Hong Jin Kang, Truong Giang Nguyen, Xuan-Bach Dinh Le, Corina S. Pasareanu, David Lo 0001 |
Test mimicry to assess the exploitability of library vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18 - 22, 2022, pp. 276-288, 2022, ACM, 978-1-4503-9379-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Donato Impedovo, Annalisa Longo, Tonino Palmisano, Lucia Sarcinella, Davide Veneto |
An Investigation on Voice Mimicry Attacks to a Speaker Recognition System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITASEC ![In: Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), Rome, Italy, June 20-23, 2022., pp. 114-123, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
20 | Angela Saquinaula, Adriel Juarez, Joe Geigel, Reynold Bailey, Cecilia O. Alm |
Emotional Empathy and Facial Mimicry of Avatar Faces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VR Workshops ![In: 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, VR Workshops, Christchurch, New Zealand, March 12-16, 2022, pp. 770-771, 2022, IEEE, 978-1-6654-8402-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Giulia Perugia, Maike Paetzel-Prüsmann, Isabelle Hupont, Giovanna Varni, Mohamed Chetouani, Christopher Edward Peters, Ginevra Castellano |
Does the Goal Matter? Emotion Recognition Tasks Can Change the Social Value of Facial Mimicry Towards Artificial Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Robotics AI ![In: Frontiers Robotics AI 8, pp. 699090, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Hyunjun Kim, Sunwoo Ahn, Whoi Ree Ha, Hyunjae Kang, Dong Seong Kim 0001, Huy Kang Kim, Yunheung Paek |
Panop: Mimicry-Resistant ANN-Based Distributed NIDS for IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 111853-111864, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Beibei Kuang, Xueting Li, Xintong Li, Mingxiao Lin, Shanrou Liu, Ping Hu |
The effect of eye gaze direction on emotional mimicry: A multimodal study with electromyography and electroencephalography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeuroImage ![In: NeuroImage 226, pp. 117604, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Gennady M. Verkhivker, Steve Agajanian, Deniz Yasar Oztas, Grace Gupta |
Allosteric Control of Structural Mimicry and Mutational Escape in the SARS-CoV-2 Spike Protein Complexes with the ACE2 Decoys and Miniprotein Inhibitors: A Network-Based Approach for Mutational Profiling of Binding and Signaling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Chem. Inf. Model. ![In: J. Chem. Inf. Model. 61(10), pp. 5172-5191, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Ziwei Wu, Lingdong Huang |
Mimicry: Genetic-algorithm-based Real-time System of Virtual Insects in a Living Environment-A New and Altered Nature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Comput. Graph. Interact. Tech. ![In: Proc. ACM Comput. Graph. Interact. Tech. 4(2), pp. 28:1-28:8, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Giulia Perugia, Maike Paetzel-Prüsmann, Isabelle Hupont, Giovanna Varni, Mohamed Chetouani, Christopher Edward Peters, Ginevra Castellano |
Does the Goal Matter? Emotion Recognition Tasks Can Change the Social Value of Facial Mimicry towards Artificial Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.02098, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
20 | Takeshi Ishida |
Mimicry mechanism model of octopus epidermis pattern by inverse operation of Turing reaction model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.01512, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
20 | Catherine Spicer, Prashanna Khwaounjoo, Yusuf Özgür Çakmak |
Human and Human-Interfaced AI Interactions: Modulation of Human Male Autonomic Nervous System via Pupil Mimicry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 21(4), pp. 1028, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Furkan Alaca, AbdelRahman Abdou, Paul C. van Oorschot |
Comparative Analysis and Framework Evaluating Mimicry-Resistant and Invisible Web Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 18(2), pp. 534-549, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Qunke Wang, Lanting Fang, Zhenchao Zhu, Jie Huang 0016 |
Detection Algorithm of the Mimicry Attack based on Variational Auto-Encoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN Workshops ![In: 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2021, Taipei, Taiwan, June 21-24, 2021, pp. 114-120, 2021, IEEE, 978-1-6654-3950-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Mikihiro Suda, Mizuki Oka |
Evaluation of the effect of mimicry on facial expression in Avatar-Mediated Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALIFE ![In: 2021 Conference on Artificial Life, ALIFE 2021, online, July 19-23, 2021, pp. 48, 2021, MIT Press. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Shurook S. Almohamade, John A. Clark, James Law |
Mimicry Attacks Against Behavioural-Based User Authentication for Human-Robot Interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETAA ![In: Emerging Technologies for Authorization and Authentication - 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers, pp. 111-126, 2021, Springer, 978-3-030-93746-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Lei Xue, Geyang Xiao, Tao Zou, Ruyun Zhang, Xingming Zhang |
A mimicry defense based algorithm diversification dynamic scheduling mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAC ![In: 2021 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2021, Chengdu, China, June 18-20, 2021, pp. 66-70, 2021, IEEE, 978-1-6654-4322-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Zhihao Wang, Dingde Jiang, Jianguang Chen, Wei Yang |
Deep Reinforcement Learning Based Mimicry Defense System for IoT Message Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SimuTools ![In: Simulation Tools and Techniques - 13th EAI International Conference, SIMUtools 2021, Virtual Event, November 5-6, 2021, Proceedings, pp. 421-431, 2021, Springer, 978-3-030-97123-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Tao Zheng, Zuyao Meng, Qing Gu, Fei Huang, Mikael Gidlund |
A Preliminary Prototype Based on Biological Mimicry for Hardware Data Acquisition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: 26th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2021, Vasteras, Sweden, September 7-10, 2021, pp. 1-4, 2021, IEEE, 978-1-7281-2989-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Hassan Khan, Urs Hengartner, Daniel Vogel 0001 |
Mimicry Attacks on Smartphone Keystroke Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 23(1), pp. 2:1-2:34, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Kaihang Wu, Chunfeng Liu 0005, Rafael A. Calvo |
Automatic Nonverbal Mimicry Detection and Analysis in Medical Video Consultations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Hum. Comput. Interact. ![In: Int. J. Hum. Comput. Interact. 36(14), pp. 1379-1392, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Yigit Oktar, Erdem Okur, Mehmet Türkan |
The Mimicry Game: Towards Self-recognition in Chatbots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.02334, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Kwot Sin Lee, Christopher Town 0001 |
Mimicry: Towards the Reproducibility of GAN Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.02494, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
20 | Ville Vestman, Tomi Kinnunen, Rosa González Hautamäki, Md. Sahidullah |
Voice Mimicry Attacks Assisted by Automatic Speaker Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Speech Lang. ![In: Comput. Speech Lang. 59, pp. 36-54, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Natalia Sanchez de Groot, Marc Torrent Burgas |
Bacteria use structural imperfect mimicry to hijack the host interactome. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLoS Comput. Biol. ![In: PLoS Comput. Biol. 16(12), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Wei Liu 0043, Yufei Peng, Zhao Tian, Yang Li, Wei She |
A Medical Blockchain Privacy Protection Model Based on Mimicry Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIS (2) ![In: Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II, pp. 581-592, 2020, Springer, 978-3-030-57880-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Zepf, Arijit Gupta, Jan-Peter Krämer, Wolfgang Minker |
EmpathicSDS: Investigating Lexical and Acoustic Mimicry to Improve Perceived Empathy in Speech Dialogue Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIU ![In: Proceedings of the 2nd Conference on Conversational User Interfaces, CUI 2020, Bilbao, Spain, July 22-24, 2020, pp. 2:1-2:9, 2020, ACM, 978-1-4503-7544-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Riku Arakawa, Hiromu Yakura |
Mimicker-in-the-Browser: A Novel Interaction Using Mimicry to Augment the Browsing Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMI ![In: ICMI '20: International Conference on Multimodal Interaction, Virtual Event, The Netherlands, October 25-29, 2020, pp. 351-360, 2020, ACM, 978-1-4503-7581-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Chuan He, Yinghao Xu, Jitong Shi, Chongqing Lei, Guyue Li |
Detection Algorithm of the Mimicry Attack and Its Implementation in the ZigBee Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 20th IEEE International Conference on Communication Technology, ICCT 2020, Nanning, China, October 28-31, 2020, pp. 1083-1088, 2020, IEEE, 978-1-7281-8141-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 253 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|