{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:38:48Z","timestamp":1729665528257,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/fg.2013.6553802","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T18:57:08Z","timestamp":1374778628000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Automated analysis of interactional synchrony using robust facial tracking and expression recognition"],"prefix":"10.1109","author":[{"given":"Xiang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Shaoting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Norah","family":"Dunbar","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Judee K.","family":"Burgoon","sequence":"additional","affiliation":[]},{"given":"Dimitris N.","family":"Metaxas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"289","article-title":"Robust active shape model search","author":"rogers","year":"2006","journal-title":"Proc ECCV"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1452392.1452426"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539871"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2388676.2388714"},{"key":"16","first-page":"504","article-title":"Locating facial features with an extended active shape model","author":"milborrow","year":"2008","journal-title":"Proc ECCV"},{"key":"13","first-page":"198","volume":"11","author":"meservy","year":"2005","journal-title":"Automatic Extraction of Deceptive Behavioral Cues from Video"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-6335-8"},{"key":"11","first-page":"321","article-title":"Face alignment using statistical models and wavelet features","author":"jiao","year":"2003","journal-title":"Proc CVPR"},{"key":"12","first-page":"492","article-title":"Tracking facial features using mixture of point distribution models","author":"kanaujia","year":"2006","journal-title":"ICVGIP"},{"key":"21","first-page":"593","article-title":"Good features to track","author":"shi","year":"1994","journal-title":"Proc CVPR"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34014-7"},{"journal-title":"Criminal Profiling - An Introduction to Behavioral Evidence Analysis","year":"2008","author":"turvey","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1348\/1355325041719356"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2001.tb00774.x"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771410"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383059"},{"key":"29","first-page":"1018","article-title":"Rankboost with l1 regularization for facial expression recognition and intensity estimation","author":"yang","year":"2009","journal-title":"ICCV"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00129.x"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_2"},{"key":"10","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.21437\/Interspeech.2005-580","article-title":"Distinguishing deceptive from non-deceptive speech","author":"hirschberg","year":"2005","journal-title":"Proc Interspeech 2005-Eurospeech"},{"key":"1","first-page":"6","article-title":"Who can best catch a liar","volume":"15","author":"aamodt","year":"2006","journal-title":"A Metaanalysis of Individual Differences in Detecting Deception"},{"key":"30","article-title":"Is interactional dissynchrony a clue to deception: Insights from automated analysis of nonverbal visual cues","author":"yu","year":"2012","journal-title":"HICSS"},{"key":"7","article-title":"A dyadic approach to the detection of deception","author":"dunbar","year":"2011","journal-title":"HICSS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1995.1004"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2011.08.004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885507"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995322"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1006\/jesp.1995.1014"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1162\/jmlr.2003.4.6.933"},{"key":"8","article-title":"Cheating and credibility: How modality and power affect veracity detection","author":"dunbar","year":"2010","journal-title":"Annual Meeting of the National Communication Association"}],"event":{"name":"2013 10th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2013)","start":{"date-parts":[[2013,4,22]]},"location":"Shanghai, China","end":{"date-parts":[[2013,4,26]]}},"container-title":["2013 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6548361\/6553693\/06553802.pdf?arnumber=6553802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T03:27:45Z","timestamp":1646191665000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6553802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/fg.2013.6553802","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}