Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emotional Features of Interactions with Empathic Agents., , , , , , , , , and 3 other author(s). ICCVW, page 2168-2176. IEEE, (2021)Identification and prediction of attacks to industrial control systems using temporal point processes., , , and . J. Ambient Intell. Humaniz. Comput., 14 (5): 4771-4783 (2023)Using Eye Tracking to Investigate Interaction Between Humans and Virtual Agents., , , , , , , , , and . CogSIMA, page 125-132. IEEE, (2022)The Role of Language in Building Automatic Models for Depression Detection., , , , , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)Toward an Interoperable Catalogue of Multimodal Depression-Related Data., , , , , , , , , and . AII, page 376-390. (2022)Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 916-920. IEEE, (2023)Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems., , , and . CSR, page 221-226. IEEE, (2022)Android Robots vs Virtual Agents: which system differently aged users prefer?, , , , and . RO-MAN, page 1-7. IEEE, (2022)Effects of a chance task outcome on the offers in the ultimatum game: The mediation role of emotions., , , and . CogInfoCom, page 295-300. IEEE, (2016)IoT Security: Exploring Strategies and Approaches.. SEBD, volume 3478 of CEUR Workshop Proceedings, page 703-710. CEUR-WS.org, (2023)