{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T01:34:04Z","timestamp":1720575244199},"reference-count":88,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2015,3,1]],"date-time":"2015-03-01T00:00:00Z","timestamp":1425168000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1064965","IIS-1065013","CNS-1059281","CNS-1059218","IIS-0964597","IIS-0964385"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Space Biomedical Research Institute through NASA","award":["NCC 9-58"]},{"name":"Center for Identification Technology Research, a National Science Foundation (NSF) Industry\/University Cooperative Research Center"},{"DOI":"10.13039\/100010942","name":"University of North Carolina at Charlotte","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100010942","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/tcyb.2014.2329673","type":"journal-article","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T18:40:44Z","timestamp":1403894444000},"page":"492-506","source":"Crossref","is-referenced-by-count":18,"title":["Is Interactional Dissynchrony a Clue to Deception? Insights From Automated Analysis of Nonverbal Visual Cues"],"prefix":"10.1109","volume":"45","author":[{"family":"Xiang Yu","sequence":"first","affiliation":[]},{"family":"Shaoting Zhang","sequence":"additional","affiliation":[]},{"family":"Zhennan Yan","sequence":"additional","affiliation":[]},{"family":"Fei Yang","sequence":"additional","affiliation":[]},{"family":"Junzhou Huang","sequence":"additional","affiliation":[]},{"given":"Norah E.","family":"Dunbar","sequence":"additional","affiliation":[]},{"given":"Matthew L.","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Judee K.","family":"Burgoon","sequence":"additional","affiliation":[]},{"given":"Dimitris N.","family":"Metaxas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2052592"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0"},{"key":"ref71","first-page":"569","article-title":"Introduction to terrorism: Understanding and interviewing terrorists","author":"turvey","year":"2011","journal-title":"Criminal Profiling An Introduction to Behavioral Evidence Analysis"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-6106-y"},{"key":"ref76","author":"vrij","year":"2000","journal-title":"Detecting Lies and Deceit The Psychology of Lying and the Implications for Professional Practice"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1348\/1355325041719356"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553429"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1995.9914944"},{"key":"ref38","first-page":"176","article-title":"Managerial beliefs about the behavioral cues of deception","volume":"4","author":"hart","year":"2006","journal-title":"Indiv Differ Res"},{"key":"ref78","author":"vrij","year":"2008","journal-title":"Detecting Lies and Deceit Pitfalls and Opportunities"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1348\/000712601162248"},{"key":"ref33","first-page":"933","article-title":"An efficient boosting algorithm for combining preferences","volume":"4","author":"freund","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022966505471"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00052-3"},{"key":"ref30","article-title":"Effects of veracity, modality and sanctioning on credibility assessment during mediated and unmediated interviews","author":"dunbar","year":"2013","journal-title":"Commun Res"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247979"},{"key":"ref36","author":"grice","year":"1989","journal-title":"Studies in The Way of Words"},{"key":"ref35","author":"goleman","year":"2006","journal-title":"Social Intelligence The New Science of Human Relationships"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00329.x"},{"key":"ref60","article-title":"Conditional random fields for object recognition","author":"quattoni","year":"2004","journal-title":"Proc Neural Inf Process Syst (NIPS)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199231751.003.0004"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0000_29"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.humov.2007.07.002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10919-014-0179-z"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1658349.1658351"},{"key":"ref27","article-title":"Automatic social influence: The perception-behavior link as an explanatory mechanism for behavior matching","author":"dijksterhuis","year":"2001","journal-title":"Social influence direct and indirect processes"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-010-0380-4"},{"key":"ref66","first-page":"593","article-title":"Good features to track","author":"shi","year":"1994","journal-title":"Proc Comput Vis Pattern Recognit (CVPR)"},{"key":"ref29","author":"dunbar","year":"2011","journal-title":"A dyadic approach to the detection of deception"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1037\/0096-1523.29.2.326"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015422"},{"key":"ref69","article-title":"A probabilistic framework for rigid and non-rigid appearance based tracking and recognition","author":"torre","year":"2001","journal-title":"Proc Int Conf Autom Face Gesture Recognit"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1037\/a0015017"},{"key":"ref1","first-page":"6","article-title":"Who can best catch a liar?: A meta-analysis of individual differences in detecting deception","volume":"15","author":"aamodt","year":"2006","journal-title":"The Forensic Examiner"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1995.1004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5244\/C.20.95"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1878116.1878131"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008122917811"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/T-AFFC.2012.12"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1037\/h0073583"},{"key":"ref51","volume":"389","author":"metaxas","year":"1997","journal-title":"Physics-Based Deformable Models Applications to Computer Vision Graphics and Medical Imaging"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/34.895976"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1080\/17470910701563392"},{"key":"ref57","article-title":"Feature selection, l1 vs. l2 regularization, and rotational invariance","author":"ng","year":"2003","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref56","first-page":"19","article-title":"A four-domain model for detecting deception","volume":"72","author":"navarro","year":"2003","journal-title":"Law Enforcement Bulletin"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383299"},{"key":"ref54","first-page":"504","article-title":"Locating facial features with an extended active shape model","author":"milborrow","year":"2008","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref53","article-title":"Motion profiles for deception detection using visual cues","author":"michael","year":"2010","journal-title":"Proc Eur Conf Comput Vis (ECCV)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2013.03.005"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1515\/9783110276794.225","article-title":"Interpersonal adaptation","author":"burgoon","year":"2014","journal-title":"Handbooks of Communication Science Vol 6 Interpersonal Communication"},{"key":"ref11","article-title":"Noninvasive measurement of multimodal indicators of deception and credibility","author":"burgoon","year":"2010"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222280107"},{"key":"ref12","author":"burgoon","year":"2007","journal-title":"Interpersonal Adaptation Dyadic Interaction Patterns"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISUC.2008.36"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.76.6.893"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S1077-3142(03)00081-X"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2001.tb00774.x"},{"key":"ref16","first-page":"388","article-title":"Automated analysis of the configuration and timing of facial expression","author":"cohn","year":"2005","journal-title":"What the Face Reveals Basic and Applied Studies of Spontaneous Expression Using the Facial Action Coding System"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459207"},{"key":"ref17","first-page":"484","article-title":"Active appearance models","author":"cootes","year":"1998","journal-title":"Proc 5th Eur Conf Comput Vis (ECCV)"},{"key":"ref84","article-title":"Rankboost with l1 regularization for facial expression recognition and intensity estimation","author":"yang","year":"2009","journal-title":"Proc Int Conf Comput Vis (ICCV)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937601"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1964921.1964955"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2000.840639"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1023\/A:1006610329284"},{"key":"ref4","article-title":"An instantaneous correlation algorithm for assessing intra and inter subject coordination during communicative behavior","author":"barbosa","year":"2010","journal-title":"Proc Workshop Modeling Human Commun Dyn Neural Inf Process Syst (NIPS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2005.01619.x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007977618277"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2011.5771407"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.244"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_2"},{"key":"ref86","article-title":"Explicit occlusion detection based deformable fitting for facial landmark localization","author":"yu","year":"2013","journal-title":"Proc IEEE Int Conf Face Gesture Recognit"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.7.3.338"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2010.01374.x"},{"key":"ref87","article-title":"Is interactional dissynchrony a clue to deception: Insights from automated analysis of nonverbal visual cues","author":"yu","year":"2013","journal-title":"Proc Hawaii Int Conf Syst Sci (HICSS)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2013.6553802"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1348\/135532507X251641"},{"key":"ref45","article-title":"Spatiotemporal coding in anvil","author":"kipp","year":"2008","journal-title":"Proc 6th Int Lang Resour Eval (LERC)"},{"key":"ref48","first-page":"44","article-title":"Physiological aspects of emotional knowledge and rapport","author":"levenson","year":"1997","journal-title":"Empathic Accuracy"},{"key":"ref47","first-page":"646","article-title":"The polygraph and deception","volume":"18","author":"larson","year":"1927","journal-title":"Welfare Mag"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/971478.971509"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11949619_44"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/AFGR.2000.840610"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-006-9073-5"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/7041256\/06845335.pdf?arnumber=6845335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T12:46:21Z","timestamp":1649508381000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6845335\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":88,"journal-issue":{"issue":"3"},"URL":"http:\/\/dx.doi.org\/10.1109\/tcyb.2014.2329673","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3]]}}}