Author of the publication

Automatic Micro-expression Recognition from Long Video Using a Single Spotted Apex.

, , , and . ACCV Workshops (2), volume 10117 of Lecture Notes in Computer Science, page 345-360. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An authentication framework for peer-to-peer cloud., , , , , and . SIN, page 94-101. ACM, (2013)Advanced Slide Attacks Revisited: Realigning Slide on DES.. Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 263-276. Springer, (2005)Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs., and . IWDW, volume 3304 of Lecture Notes in Computer Science, page 184-191. Springer, (2004)On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation., and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 136-146. Springer, (2005)On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards., and . ICCSA (1), volume 3480 of Lecture Notes in Computer Science, page 488-497. Springer, (2005)Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme., , , , , and . ICYCS, page 2289-2294. IEEE Computer Society, (2008)Providing Security in 4G Systems: Unveiling the Challenges., , , and . AICT, page 439-444. IEEE Computer Society, (2010)Subtle Expression Recognition Using Optical Strain Weighted Features., , , , , and . ACCV Workshops (2), volume 9009 of Lecture Notes in Computer Science, page 644-657. Springer, (2014)New Multiset Attacks on Rijndael with Large Blocks., , and . Mycrypt, volume 3715 of Lecture Notes in Computer Science, page 277-295. Springer, (2005)Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks., and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 138-148. Springer, (2002)