Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2019
DOI: 10.1145/3360774.3360793
|View full text |Cite
|
Sign up to set email alerts
|

A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…For example, people generally infer emotional states such as happiness, sadness, fear, and anger from facial expressions and tone of voice. Therefore, facial emotion recognition (FER) [1][2][3][4] has been studied in computer vision and machine learning over the past several decades. Indeed, FER technology is rapidly emerging in the field of emotional Information and Communication Technology (ICT), including virtual reality, augmented reality, Advanced Driver Assistance Systems (ADAS), and human-computer interaction.…”
Section: Introductionmentioning
confidence: 99%
“…For example, people generally infer emotional states such as happiness, sadness, fear, and anger from facial expressions and tone of voice. Therefore, facial emotion recognition (FER) [1][2][3][4] has been studied in computer vision and machine learning over the past several decades. Indeed, FER technology is rapidly emerging in the field of emotional Information and Communication Technology (ICT), including virtual reality, augmented reality, Advanced Driver Assistance Systems (ADAS), and human-computer interaction.…”
Section: Introductionmentioning
confidence: 99%
“…Facial emotion recognition (FER) [1][2][3][4] is an interesting field that is actually expanding considerably. This domain touches the psychological condition of a human being, his behavior, and his responses.…”
Section: Introductionmentioning
confidence: 99%
“…In several approaches, the identification framework focuses on relevant extracted information in real cases. Shome et al [1] 2 of 15 proposed a facial feature extraction technique to detect cyber abuse activities. They accomplished an integrated real-time detection module.…”
Section: Introductionmentioning
confidence: 99%