{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:19:07Z","timestamp":1767320347609,"version":"3.48.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032123848","type":"print"},{"value":"9783032123855","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-12385-5_14","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:14:11Z","timestamp":1767320051000},"page":"225-238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Explainable Detection of\u00a0Implicit Influential Patterns in\u00a0Conversations via\u00a0Data Augmentation"],"prefix":"10.1007","author":[{"given":"Sina","family":"Abdidizaji","sequence":"first","affiliation":[]},{"given":"Md","family":"Kowsher","sequence":"additional","affiliation":[]},{"given":"Niloofar","family":"Yousefi","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Garibay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Abdidizaji, S., Baekey, A., Jayalath, C., Mantzaris, A., Garibay, O.O., Garibay, I.: Analyzing x\u2019s web of influence: dissecting news sharing dynamics through credibility and popularity with transfer entropy and multiplex network measures. In: International Conference on Advances in Social Networks Analysis and Mining, pp. 124\u2013138. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-78541-2_8","DOI":"10.1007\/978-3-031-78541-2_8"},{"issue":"4","key":"14_CR2","doi-asserted-by":"publisher","first-page":"394","DOI":"10.3390\/e23040394","volume":"23","author":"R Akula","year":"2021","unstructured":"Akula, R., Garibay, I.: Interpretable multi-head self-attention architecture for sarcasm detection in social media. Entropy 23(4), 394 (2021)","journal-title":"Entropy"},{"key":"14_CR3","unstructured":"Atwell, K., Hassan, S., Alikhani, M.: APPDIA: a discourse-aware transformer-based style transfer model for offensive social media conversations. In: Proceedings of the 29th International Conference on Computational Linguistics, pp. 6063\u20136074 (2022)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Bakhtin, M.M.: Speech genres and other late essays. University of Texas press (1986)","DOI":"10.7560\/720466"},{"key":"14_CR5","first-page":"72","volume":"50","author":"A Barnhill","year":"2014","unstructured":"Barnhill, A.: What is manipulation. Manip. Theory Pract. 50, 72 (2014)","journal-title":"Theory Pract."},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Boerner, T.J., Deems, S., Furlani, T.R., Knuth, S.L., Towns, J.: ACCESS: advancing innovation: NSF\u2019s advanced cyberinfrastructure coordination ecosystem: services & support. In: Practice and Experience in Advanced Research Computing 2023: Computing for the Common Good, PEARC 2023, pp. 173\u2013176. Association for Computing Machinery (2023)","DOI":"10.1145\/3569951.3597559"},{"key":"14_CR7","first-page":"1877","volume":"33","author":"T Brown","year":"2020","unstructured":"Brown, T., et al.: Language models are few-shot learners. Adv. Neural Inf. Process. Syst. 33, 1877\u20131901 (2020)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"14_CR8","unstructured":"DeepSeek-AI, Guo, D., et\u00a0al. DeepSeek-R1: incentivizing reasoning capability in LLMS via reinforcement learning. arXiv preprint arXiv:2501.12948 (2025)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"ElSherief, M., et al.: Latent hatred: a benchmark for understanding implicit hate speech. In: Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, pp. 345\u2013363 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.29"},{"key":"14_CR10","unstructured":"Gao, Y., Bao, H., Zhang, T., Li, B., Wang, Z., Chen, W.: MENTALMAC: enhancing large language models for detecting mental manipulation via multi-task anti-curriculum distillation. arXiv preprint arXiv:2505.15255 (2025)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Suri, M., Chiniya, P., Tyagi, U., Kumar, S., Manocha, D.: COSYN: detecting implicit hate speech in online conversations using a context synergized hyperbolic network. In: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, pp. 6159\u20136173 (2023)","DOI":"10.18653\/v1\/2023.emnlp-main.377"},{"key":"14_CR12","unstructured":"Grattafiori, A., et\u00a0al.: The llama 3 herd of models. arXiv preprint arXiv:2407.21783 (2024)"},{"key":"14_CR13","unstructured":"Guo, Z.: Understanding and combating online social deception. PhD thesis, Virginia Polytechnic Institute and State University (2023)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Hartvigsen, T., Gabriel, S., Palangi, H., Sap, M., Ray, D., Kamar, E.: ToxiGen: a large-scale machine-generated dataset for adversarial and implicit hate speech detection. In: Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 3309\u20133326 (2022)","DOI":"10.18653\/v1\/2022.acl-long.234"},{"key":"14_CR15","unstructured":"Hu, E.J., et\u00a0al. LoRA: low-rank adaptation of large language models. ICLR, 1(2), 3 (2022)"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"James, G., Witten, D., Hastie, T., Tibshirani, R., Taylor, J.: An Introduction to Statistical Learning: With Applications in Python. Springer Texts in Statistics. Springer International Publishing (2023). https:\/\/doi.org\/10.1007\/978-3-031-38747-0","DOI":"10.1007\/978-3-031-38747-0"},{"key":"14_CR17","first-page":"22199","volume":"35","author":"T Kojima","year":"2022","unstructured":"Kojima, T., Gu, S.S., Reid, M., Matsuo, Y., Iwasawa, Y.: Large language models are zero-shot reasoners. Adv. Neural Inf. Process. Syst. 35, 22199\u201322213 (2022)","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"10","key":"14_CR18","doi-asserted-by":"publisher","first-page":"5923","DOI":"10.1177\/14614448221142007","volume":"26","author":"L Laestadius","year":"2024","unstructured":"Laestadius, L., Bishop, A., Gonzalez, M., Illen\u010d\u00edk, D., Campos-Castillo, C.: Too human and not human enough: a grounded theory analysis of mental health harms from emotional dependence on the social chatbot replika. New Media Soc. 26(10), 5923\u20135941 (2024)","journal-title":"New Media Soc."},{"key":"14_CR19","unstructured":"Larochelle, H., Erhan, D., Bengio, Y.: Zero-data learning of new tasks. In: AAAI, vol.\u00a01, p.\u00a03 (2008)"},{"key":"14_CR20","unstructured":"Ma, J., et al.: Detecting conversational mental manipulation with intent-aware prompting. In: Proceedings of the 31st International Conference on Computational Linguistics, pp. 9176\u20139183 (2025)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Turcan, E., McKeown, K.: Dreaddit: a reddit dataset for stress analysis in social media. In: EMNLP-IJCNLP 2019, pp.\u00a097 (2019)","DOI":"10.18653\/v1\/D19-6213"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yang, I., Hassanpour, S., Vosoughi, S.: MentalManip: a dataset for fine-grained analysis of mental manipulation in conversations. In: Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 3747\u20133764 (2024)","DOI":"10.18653\/v1\/2024.acl-long.206"},{"key":"14_CR23","unstructured":"Wei, J., et al.: Finetuned language models are zero-shot learners. In: International Conference on Learning Representations (2021)"},{"key":"14_CR24","unstructured":"Yang, I., Guo, X., Xie, S., Vosoughi S.: Enhanced detection of conversational mental manipulation through advanced prompting techniques. arXiv preprint arXiv:2408.07676 (2024)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Yavnyi, S., et al.: DeTexD: a benchmark dataset for delicate text detection. In: The 7th Workshop on Online Abuse and Harms (WOAH), pp. 14\u201328 (2023)","DOI":"10.18653\/v1\/2023.woah-1.2"},{"issue":"1","key":"14_CR26","doi-asserted-by":"publisher","first-page":"131","DOI":"10.53022\/oarjst.2024.12.1.0122","volume":"12","author":"Ahmed Al Zaidy","year":"2024","unstructured":"Ahmed Al Zaidy: Cybersecurity and personal privacy: protecting yourself in the digital age. Open Access Res. J. Sci. Technol. 12(1), 131\u2013135 (2024)","journal-title":"Open Access Res. J. Sci. Technol."},{"issue":"1","key":"14_CR27","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1162\/coli_a_00502","volume":"50","author":"C Ziems","year":"2024","unstructured":"Ziems, C., Held, W., Shaikh, O., Chen, J., Zhang, Z., Yang, D.: Can large language models transform computational social science? Comput. Linguist. 50(1), 237\u2013291 (2024)","journal-title":"Comput. Linguist."}],"container-title":["Lecture Notes in Computer Science","HCI International 2025 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12385-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:14:13Z","timestamp":1767320053000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-12385-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032123848","9783032123855"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-12385-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This paper proposes a framework for detecting implicit influential patterns embedded within conversations. No original data collection was conducted for this study; instead, we utilized publicly available datasets for our downstream tasks. Consequently, no approval for human subjects research was required. In the paper introducing the dataset [\n                      \n                      ], the authors stated that the data was collected from movies and subsequently annotated by experts. For further details regarding the dataset\u2019s data collection procedures, refer to the original publication by [\n                      \n                      ]","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Consideration"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}