{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:29:38Z","timestamp":1742959778356,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503406"},{"type":"electronic","value":"9783030503413"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50341-3_7","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"80-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Deceptive Language in Crime Interrogation"],"prefix":"10.1007","author":[{"given":"Yi-Ying","family":"Kao","sequence":"first","affiliation":[]},{"given":"Po-Han","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chun-Chiao","family":"Tzeng","sequence":"additional","affiliation":[]},{"given":"Zi-Yuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Boaz","family":"Shmueli","sequence":"additional","affiliation":[]},{"given":"Lun-Wei","family":"Ku","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Ma, W.-Y., Chen, K.-J.: Introduction to CKIP Chinese word segmentation system for the first international Chinese word segmentation bakeoff, pp. 168\u2013171. Association for Computational Linguistics (2003)","DOI":"10.3115\/1119250.1119276"},{"key":"7_CR2","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"issue":"8","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1037\/0033-2909.129.1.74","volume":"129","author":"BM DePaulo","year":"2003","unstructured":"DePaulo, B.M., Lindsay, J.J., Malone, B.E., Muhlenbruck, L., Charlton, K., Cooper, H.: Cues to deception. Psychol. Bull. 129(1), 74 (2003)","journal-title":"Psychol. Bull."},{"key":"7_CR5","unstructured":"Vrij, A.: Detecting Lies and Deceit: The Psychology of Lying and Implications for Professional Practice. Wiley Series on the Psychology of Crime, Policing and Law (2000)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Azaria, A., Richardson, A., Kraus, S.: An agent for deception detection in discussion based environments. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 218\u2013227 (2015)","DOI":"10.1145\/2675133.2675137"},{"key":"7_CR7","unstructured":"de Ruiter, B., Kachergis, G.: The mafiascum dataset: a large text corpus for deception detection. arXiv preprint arXiv:1811.07851 (2018)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Pisarevskaya, D.: Deception detection in news reports in the Russian language: Lexics and discourse. In: Proceedings of the 2017 EMNLP Workshop: Natural Language Processing Meets Journalism, pp. 74\u201379 (2017)","DOI":"10.18653\/v1\/W17-4213"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Levitan, S.I., Maredia, A., Hirschberg, J.: Linguistic cues to deception and perceived deception in interview dialogues. In: Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers), pp. 1941\u20131950 (2018)","DOI":"10.18653\/v1\/N18-1176"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Bachenko, J., Fitzpatrick, E., Schonwetter, M.: Verification and implementation of language-based deception indicators in civil and criminal narratives. In: Proceedings of the 22nd International Conference on Computational Linguistics, vol. 1, pp. 41\u201348. Association for Computational Linguistics (2008)","DOI":"10.3115\/1599081.1599087"},{"key":"7_CR11","unstructured":"Zeiler, M.D.: ADADELTA: an adaptive learning rate method. CoRRabs\/1212.5701 (2012). http:\/\/arxiv.org\/abs\/1212.5701"},{"key":"7_CR12","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. CoRR abs\/1412.6980 (2014). http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"7_CR13","unstructured":"Hinton, G.: Neural Networks for Machine Learning - Lecture 6a - Overview of Mini-Batch Gradient Descent (2012)"},{"issue":"1","key":"7_CR14","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/S0893-6080(98)00116-6","volume":"12","author":"N Qian","year":"1999","unstructured":"Qian, N.: On the momentum term in gradient descent learning algorithms. Neural Netw. 12(1), 145\u2013151 (1999)","journal-title":"Neural Netw."},{"key":"7_CR15","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., Salakhutdinov, R.: Dropout: a simple way to prevent neural networks from overfitting. J. Mach. Learn. Res. 15, 1929\u20131958 (2014)","journal-title":"J. Mach. Learn. Res."}],"container-title":["Lecture Notes in Computer Science","HCI in Business, Government and Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50341-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:21:02Z","timestamp":1720570862000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50341-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503406","9783030503413"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50341-3_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}