Author of the publication

The INTERSPEECH 2016 Computational Paralinguistics Challenge: Deception, Sincerity & Native Language.

, , , , , , , , , and . INTERSPEECH, page 2001-2005. ISCA, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are Users Threatened by Credibility Assessment Systems?, , , and . J. of Management Information Systems, 29 (4): 249-262 (2013)Embodied Conversational Agent - Based Kiosk for Automated Interviewing., , , , and . J. of Management Information Systems, 28 (1): 17-48 (2011)The Automatic Detection of Chronic Pain-Related Expression: Requirements, Challenges and the Multimodal EmoPain Dataset., , , , , , , , , and 8 other author(s). IEEE Trans. Affective Computing, 7 (4): 435-451 (2016)Mitigating bias blind spot via a serious video game., , , , , , , , , and 2 other author(s). Computers in Human Behavior, (2016)A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , and . ICIS, Association for Information Systems, (2013)Predicting Users' Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics., , , and . HICSS, page 579-588. IEEE Computer Society, (2012)Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony., , , and . EISIC, page 262-265. IEEE, (2013)The INTERSPEECH 2016 Computational Paralinguistics Challenge: Deception, Sincerity & Native Language., , , , , , , , , and . INTERSPEECH, page 2001-2005. ISCA, (2016)Border Security Credibility Assessments via Heterogeneous Sensor Fusion., , , , and . IEEE Intelligent Systems, 25 (3): 41-49 (2010)Pitch detection algorithms modifications and implementations towards automated vocal analysis., , and . ICNSC, page 405-410. IEEE, (2014)