{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:43:24Z","timestamp":1743029004114,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031208614"},{"type":"electronic","value":"9783031208621"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20862-1_22","type":"book-chapter","created":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T23:29:12Z","timestamp":1667518152000},"page":"304-315","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deception Detection Towards Multi-turn Question Answering with\u00a0Context Selector Network"],"prefix":"10.1007","author":[{"given":"Yinan","family":"Bao","sequence":"first","affiliation":[]},{"given":"Qianwen","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Lingwei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Songlin","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,4]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Azaria, A., Richardson, A., Kraus, S.: An agent for deception detection in discussion based environments. In: CSCW, pp. 218\u2013227 (2015)","DOI":"10.1145\/2675133.2675137"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Bian, T., et al.: Rumor detection on social media with bi-directional graph convolutional networks. In: AAAI, pp. 549\u2013556 (2020)","DOI":"10.1609\/aaai.v34i01.5393"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning phrase representations using RNN encoder-decoder for statistical machine translation. In: EMNLP, pp. 1724\u20131734 (2014)","DOI":"10.3115\/v1\/D14-1179"},{"key":"22_CR4","unstructured":"Cui, Y., et al.: Pre-training with whole word masking for chinese BERT. arXiv: 1906.08101 (2019)"},{"key":"22_CR5","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: NAACL-HLT, pp. 4171\u20134186 (2019)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Ding, M., Zhao, A., Lu, Z., Xiang, T., Wen, J.R.: Face-focused cross-stream network for deception detection in videos. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7802\u20137811 (2019)","DOI":"10.1109\/CVPR.2019.00799"},{"key":"22_CR7","unstructured":"Feng, S., Banerjee, R., Choi, Y.: Syntactic stylometry for deception detection. In: ACL, pp. 171\u2013175 (2012)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Ghosal, D., Majumder, N., Poria, S., Chhaya, N., Gelbukh, A.F.: Dialoguegcn: A graph convolutional neural network for emotion recognition in conversation. In: EMNLP-IJCNLP, pp. 154\u2013164 (2019)","DOI":"10.18653\/v1\/D19-1015"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Hirschberg, J., et al.: Distinguishing deceptive from non-deceptive speech. In: INTERSPEECH, pp. 1833\u20131836 (2005)","DOI":"10.21437\/Interspeech.2005-580"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. In: EMNLP, pp. 1746\u20131751 (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Levitan, S.I., et al.: Cross-cultural production and detection of deception from speech. In: WMDD@ICMI, pp. 1\u20138 (2015)","DOI":"10.1145\/2823465.2823468"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Levitan, S.I., Maredia, A., Hirschberg, J.: Linguistic cues to deception and perceived deception in interview dialogues. In: NAACL-HLT, pp. 1941\u20131950 (2018)","DOI":"10.18653\/v1\/N18-1176"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Li, D., Jr., E.S.: Discriminating deception from truth and misinformation: an intent-level approach. J. Exp. Theor. Artif. Intell. 32(3), 373\u2013407 (2020)","DOI":"10.1080\/0952813X.2019.1652354"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Entity-relation extraction as multi-turn question answering. In: ACL, pp. 1340\u20131350 (2019)","DOI":"10.18653\/v1\/P19-1129"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Liu, L., Zhang, Z., Zhao, H., Zhou, X., Zhou, X.: Filling the gap of utterance-aware and speaker-aware representation for multi-turn dialogue. In: AAAI, pp. 13406\u201313414 (2021)","DOI":"10.1609\/aaai.v35i15.17582"},{"key":"22_CR16","unstructured":"Liu, Y., et al.: Roberta: A robustly optimized BERT pretraining approach. CoRR abs\/ arXiv: 1907.11692 (2019)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Lu, Y., Li, C.: GCAN: graph-aware co-attention networks for explainable fake news detection on social media. In: ACL, pp. 505\u2013514 (2020)","DOI":"10.18653\/v1\/2020.acl-main.48"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Mathur, L., Mataric, M.J.: Unsupervised audio-visual subspace alignment for high-stakes deception detection. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2021, Toronto, ON, Canada, 6\u201311 June 2021, pp. 2255\u20132259. IEEE (2021)","DOI":"10.1109\/ICASSP39728.2021.9413550"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Mihalcea, R., Strapparava, C.: The lie detector: Explorations in the automatic recognition of deceptive language. In: ACL, pp. 309\u2013312 (2009)","DOI":"10.3115\/1667583.1667679"},{"key":"22_CR20","unstructured":"Ott, M., Cardie, C., Hancock, J.T.: Negative deceptive opinion spam. In: HLT-NAACL, pp. 497\u2013501 (2013)"},{"key":"22_CR21","unstructured":"Ott, M., Choi, Y., Cardie, C., Hancock, J.T.: Finding deceptive opinion spam by any stretch of the imagination. In: ACL, pp. 309\u2013319 (2011). https:\/\/www.aclweb.org\/anthology\/P11-1032\/"},{"key":"22_CR22","volume-title":"Linguistic Inquiry and Word Count","author":"JW Pennebaker","year":"2001","unstructured":"Pennebaker, J.W., Francis, M.E., Booth, R.J.: Linguistic Inquiry and Word Count. Lawerence Erlbaum Associates, Mahwah, NJ (2001)"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: Global vectors for word representation. In: EMNLP, pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Rosas, V., Abouelenien, M., Mihalcea, R., Burzo, M.: Deception detection using real-life trial data. In: ICMI, pp. 59\u201366 (2015)","DOI":"10.1145\/2818346.2820758"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Rosas, V., Abouelenien, M., Mihalcea, R., Xiao, Y., Linton, C.J., Burzo, M.: Verbal and nonverbal clues for real-life deception detection. In: EMNLP, pp. 2336\u20132346 (2015)","DOI":"10.18653\/v1\/D15-1281"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Pisarevskaya, D.: Deception detection in news reports in the russian language: Lexics and discourse. In: NLPmJ@EMNLP, pp. 74\u201379 (2017)","DOI":"10.18653\/v1\/W17-4213"},{"key":"22_CR27","unstructured":"de Ruiter, B., Kachergis, G.: The mafiascum dataset: A large text corpus for deception detection. CoRR abs\/ arXiv:1811.07851 (2018)"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Soldner, F., P\u00e9rez-Rosas, V., Mihalcea, R.: Box of lies: Multimodal deception detection in dialogues. In: Burstein, J., Doran, C., Solorio, T. (eds.) NAACL-HLT, pp. 1768\u20131777 (2019)","DOI":"10.18653\/v1\/N19-1175"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Tsunomori, Y., Neubig, G., Sakti, S., Toda, T., Nakamura, S.: An analysis towards dialogue-based deception detection. In: Natural Language Dialog Systems and Intelligent Assistants, pp. 177\u2013187 (2015)","DOI":"10.1007\/978-3-319-19291-8_17"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Wang, X.D., Weber, L., Leser, U.: Biomedical event extraction as multi-turn question answering. In: LOUHI@EMNLP, pp. 88\u201396 (2020)","DOI":"10.18653\/v1\/2020.louhi-1.10"},{"key":"22_CR31","unstructured":"Xu, Q., Zhao, H.: Using deep linguistic features for finding deceptive opinion spam. In: COLING, pp. 1341\u20131350 (2012)"},{"key":"22_CR32","doi-asserted-by":"crossref","unstructured":"Zhou, L., Sung, Y.: Cues to deception in online chinese groups. In: HICSS-41, p. 146 (2008)","DOI":"10.1109\/HICSS.2008.109"}],"container-title":["Lecture Notes in Computer Science","PRICAI 2022: Trends in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20862-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T23:32:52Z","timestamp":1667518372000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20862-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031208614","9783031208621"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20862-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific Rim International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shangai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pricai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pricai.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"432","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"91","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7-8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"n\/a","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}