Detecting Concealment of Intent in Transportation Screening: A Proof of Concept
暂无分享,去创建一个
Matthew L. Jensen | Shan Lu | Jay F. Nunamaker | Mark Adkins | Dimitris N. Metaxas | Judee K. Burgoon | Thomas O. Meservy | John Kruse | Robert Younger | Gavriil Tsechpenakis | Douglas P. Twitchell | Amit V. Deokar | J. Nunamaker | J. Burgoon | M. Adkins | T. Meservy | G. Tsechpenakis | A. Deokar | M. Jensen | S. Lu | J. Kruse | R. Younger
[1] Elizabeth Shriberg,et al. Switchboard SWBD-DAMSL shallow-discourse-function annotation coders manual , 1997 .
[2] Alex Pentland,et al. Pfinder: real-time tracking of the human body , 1996, Proceedings of the Second International Conference on Automatic Face and Gesture Recognition.
[3] Matthew L. Jensen,et al. Deception detection through automatic, unobtrusive analysis of nonverbal behavior , 2005, IEEE Intelligent Systems.
[4] Dariu Gavrila,et al. The Visual Analysis of Human Movement: A Survey , 1999, Comput. Vis. Image Underst..
[5] Judee K. Burgoon,et al. Writing Style as Predictor of Newspaper Readership, Satisfaction and Image , 1981 .
[6] J. Nunamaker,et al. Automatic, Multimodal Evaluation of Human Interaction , 2010 .
[7] U. Undeutsch. The Development of Statement Reality Analysis , 1989 .
[8] B. Depaulo,et al. Telling lies. , 1979, Journal of personality and social psychology.
[9] H Stanislaw,et al. Calculation of signal detection theory measures , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[10] Laura K. Guerrero,et al. Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .
[11] Shan Lu,et al. Using multiple cues for hand tracking and model refinement , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..
[12] J. Burgoon. A Communication Model of Personal Space Violations: Explication and an Initial Test. , 1978 .
[13] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[14] M. Zuckerman. Verbal and nonverbal communication of deception , 1981 .
[15] Jay F. Nunamaker,et al. Training Professionals to Detect Deception , 2003, ISI.
[16] Jay F. Nunamaker,et al. Advances in automated deception detection in text-based computer-mediated communication , 2004, SPIE Defense + Commercial Sensing.
[17] J. Burgoon,et al. The Dynamic Nature of Deceptive Verbal Communication , 2006 .
[18] Jay F. Nunamaker,et al. Speech act profiling: a probabilistic method for analyzing persistent conversations and their participants , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[19] J. Searle. Expression and Meaning: A taxonomy of illocutionary acts , 1975 .
[20] Matthew L. Jensen,et al. Blob Analysis of the Head and Hands: A Method for Deception Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[21] J. Nunamaker,et al. Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .
[22] Paul Ekman,et al. Lying and nonverbal behavior: Theoretical issues and new findings , 1988 .
[23] Jay F. Nunamaker,et al. An exploratory study into deception detection in text-based computer-mediated communication , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[24] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[25] Jay F. Nunamaker,et al. Detecting Deception through Linguistic Analysis , 2003, ISI.
[26] Andreas Stolcke,et al. Dialogue act modeling for automatic tagging and recognition of conversational speech , 2000, CL.
[27] Jay F. Nunamaker,et al. Using Speech Act Profiling for Deception Detection , 2004, ISI.
[28] D. M. Green,et al. Signal detection theory and psychophysics , 1966 .
[29] A. Vrij. Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice , 2000 .
[30] J. Searle. Expression and Meaning: Studies in the Theory of Speech Acts , 1979 .
[31] Alex Pentland,et al. Pfinder: Real-Time Tracking of the Human Body , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[32] Jay F. Nunamaker,et al. StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[33] Matthew L. Jensen,et al. An Approach for Intent Identification by Building on Deception Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[34] J. Burgoon,et al. Interpersonal Deception Theory , 1996 .
[35] Harry Hollien,et al. FINAL REPORT CIFA CONTRACT - FA 4814-04-0011 Voice Stress Analyzer Instrumentation Evaluation , 2006 .
[36] Victor L. Cestaro. A Comparison Between Decision Accuracy Rates Obtained Using the Polygraph Instrument and the Computer Voice Stress Analyzer (CVSA) in the Absence of Jeopardy. , 1995 .
[37] R. Lazarick. Airport vulnerability assessment-a methodology evaluation , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[38] R. Bull,et al. Detecting Deceit via Analysis of Verbal and Nonverbal Behavior , 2000 .
[39] Shan Lu,et al. Color-based hands tracking system for sign language recognition , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.