Can We Create a TLS Lie Detector?
Saved in:
Published in | Journal of information processing (Tokyo) Vol. 32; pp. 1114 - 1124 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
2024
|
Online Access | Get full text |
ISSN | 1882-6652 1882-6652 |
DOI | 10.2197/ipsjjip.32.1114 |
Cover
Author | Hashimoto, Masaki Okubo, Takao Kanda, Atsushi |
---|---|
Author_xml | – sequence: 1 givenname: Atsushi surname: Kanda fullname: Kanda, Atsushi – sequence: 2 givenname: Masaki surname: Hashimoto fullname: Hashimoto, Masaki – sequence: 3 givenname: Takao surname: Okubo fullname: Okubo, Takao |
BookMark | eNpNz0FLwzAYxvEgE9ymZ6_xA3R73yRNmpNIdSoUPDjxGNLmDbRoW5Je_PYy3MHT8z898Nuw1TiNxNgtwk6gNft-zsPQzzspdoioLtgaq0oUWpdi9a-v2CbnAUBbKGHN7mo_8k_idSK_EPf82Lzzpif-SAt1y5Tur9ll9F-Zbs67ZR-Hp2P9UjRvz6_1Q1N0wihVtCrYYCLaWGE0MdgoKqPBtwaiBFCmBYQQKis7S6WO2ghSvoyEPpTkpdyy_d9vl6acE0U3p_7bpx-H4E5CdxY6KdxJKH8BqTFFQw |
Cites_doi | 10.1109/GreenCom.2011.41 10.3390/electronics11050679 10.1016/j.cose.2021.102542 10.1109/COMPSAC51774.2021.00150 10.1155/2023/7117863 10.1109/ICDM.2008.17 10.1016/j.cose.2023.103143 10.1109/SPW.2018.00032 10.1109/ACCESS.2019.2930717 10.1145/342009.335388 10.1109/INFCOM.2013.6567180 10.1145/3355369.3355601 10.1109/TIFS.2023.3300521 10.1145/3308558.3313738 10.32604/cmc.2019.05610 10.1155/2023/3316642 10.1109/ACCESS.2017.2747560 10.1155/2023/3676692 10.1109/CCST.2018.8585560 10.1162/089976601750264965 |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.2197/ipsjjip.32.1114 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1882-6652 |
EndPage | 1124 |
ExternalDocumentID | 10_2197_ipsjjip_32_1114 |
GroupedDBID | 2WC AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION CS3 JSF JSH KQ8 RJT RZJ TKC |
ID | FETCH-LOGICAL-c2744-b4d9d7f19f81f7fd9f28760ab70f30047b010dd893c9e56f672e4a5fe1ad5ea33 |
ISSN | 1882-6652 |
IngestDate | Tue Jul 01 01:44:57 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c2744-b4d9d7f19f81f7fd9f28760ab70f30047b010dd893c9e56f672e4a5fe1ad5ea33 |
OpenAccessLink | https://doi.org/10.2197/ipsjjip.32.1114 |
PageCount | 11 |
ParticipantIDs | crossref_primary_10_2197_ipsjjip_32_1114 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-00-00 |
PublicationDateYYYYMMDD | 2024-01-01 |
PublicationDate_xml | – year: 2024 text: 2024-00-00 |
PublicationDecade | 2020 |
PublicationTitle | Journal of information processing (Tokyo) |
PublicationYear | 2024 |
References | 22 23 24 25 26 27 28 29 30 31 10 32 11 33 12 34 13 35 14 36 15 37 16 38 17 18 19 1 2 3 4 5 6 7 8 9 20 21 |
References_xml | – ident: 2 – ident: 25 doi: 10.1109/GreenCom.2011.41 – ident: 4 – ident: 16 doi: 10.3390/electronics11050679 – ident: 12 doi: 10.1016/j.cose.2021.102542 – ident: 35 – ident: 37 – ident: 33 – ident: 27 doi: 10.1109/COMPSAC51774.2021.00150 – ident: 28 – ident: 19 doi: 10.1155/2023/7117863 – ident: 30 doi: 10.1109/ICDM.2008.17 – ident: 18 doi: 10.1016/j.cose.2023.103143 – ident: 24 doi: 10.1109/SPW.2018.00032 – ident: 9 – ident: 7 – ident: 13 doi: 10.1109/ACCESS.2019.2930717 – ident: 22 – ident: 31 doi: 10.1145/342009.335388 – ident: 3 – ident: 23 doi: 10.1109/INFCOM.2013.6567180 – ident: 5 – ident: 1 – ident: 36 – ident: 11 – ident: 10 doi: 10.1145/3355369.3355601 – ident: 14 doi: 10.1109/TIFS.2023.3300521 – ident: 34 – ident: 26 doi: 10.1145/3308558.3313738 – ident: 15 doi: 10.32604/cmc.2019.05610 – ident: 20 doi: 10.1155/2023/3316642 – ident: 38 doi: 10.1109/ACCESS.2017.2747560 – ident: 17 doi: 10.1155/2023/3676692 – ident: 6 – ident: 8 – ident: 21 – ident: 32 doi: 10.1109/CCST.2018.8585560 – ident: 29 doi: 10.1162/089976601750264965 |
SSID | ssj0069050 |
Score | 1.8803179 |
SourceID | crossref |
SourceType | Index Database |
StartPage | 1114 |
Title | Can We Create a TLS Lie Detector? |
Volume | 32 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT4NAEN7UevHi2_jOmngwIWB5bjmpaTSmVRMjTXtrFtiNbZPSWHrQX-8MSyk2NaleCGxgA3zwMd8wD0IufdD-EZdcx3ZHugNCWa_7UuimHTFfxjW3nvU6fH7xHttOs-t2K5XbcnZJGhrR19K8kv-gCmOAK2bJ_gHZYlIYgHXAF5aAMCxXwrgBL2dHaA00_ITGteDpDUQ2RgKlyhn_M2qvWa4SUWQtamOVK5D7DIJk-JmU_AMtdDVkDJJOppP3_pyyYANwTlTGzwQs0cJhO5yG2XDAhzwp-xVUInNOgmh1e56qLGuIJWM5c-aeSUV9QJpO6TMKdpyzjKKBIfEncX88GQz6Y8O2jPmB5WLYCx-pInQQRAtO0csn6NkWihhnjaxbjJkY1Nl6Lf4jgfTPevQWZ6-KO-EE1wtnULJLSgZGsE02c3DonYJ5h1TEaJdszbpu0JyE98gFoE47girUKaeAOgXU6Qz1m33SfrgPGo963uhCj7BAox46sR8zafqybkomY1-CjvVqPGQ1iRXRWAiqOY7BtIx84XrSY5ZwuCuFyWNXcNs-INVRMhKHhKKi5KFl2y52FcfEa-nGrmdbLDQxHueIXM0uszdW9Ux6v9zS49V3PSEb-Agp19QpqaYfU3EGxloanmd4fANzrDsI |
linkProvider | Colorado Alliance of Research Libraries |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Can+We+Create+a+TLS+Lie+Detector%3F&rft.jtitle=Journal+of+information+processing+%28Tokyo%29&rft.au=Kanda%2C+Atsushi&rft.au=Hashimoto%2C+Masaki&rft.au=Okubo%2C+Takao&rft.date=2024&rft.issn=1882-6652&rft.eissn=1882-6652&rft.volume=32&rft.spage=1114&rft.epage=1124&rft_id=info:doi/10.2197%2Fipsjjip.32.1114&rft.externalDBID=n%2Fa&rft.externalDocID=10_2197_ipsjjip_32_1114 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1882-6652&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1882-6652&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1882-6652&client=summon |