{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:35:46Z","timestamp":1775694946265,"version":"3.50.1"},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Berrin Yanikoglu"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Affective Comput."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/taffc.2020.3015684","type":"journal-article","created":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T22:26:29Z","timestamp":1597184789000},"page":"306-319","source":"Crossref","is-referenced-by-count":58,"title":["Multimodal Deception Detection Using Real-Life Trial Data"],"prefix":"10.1109","volume":"13","author":[{"given":"M. Umut","family":"Sen","sequence":"first","affiliation":[{"name":"Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0581-2334","authenticated-orcid":false,"given":"Veronica","family":"Perez-Rosas","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7403-7592","authenticated-orcid":false,"given":"Berrin","family":"Yanikoglu","sequence":"additional","affiliation":[{"name":"Faculty of Engineering and Natural Sciences, Sabanci University, Istanbul, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5351-5778","authenticated-orcid":false,"given":"Mohamed","family":"Abouelenien","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, University of Michigan-Dearborn, Dearborn, MI, USA"}]},{"given":"Mihai","family":"Burzo","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, University of Michigan Flint, Flint, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0767-6703","authenticated-orcid":false,"given":"Rada","family":"Mihalcea","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2092195"},{"key":"ref2","volume-title":"Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice","author":"Vrij","year":"2001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/9780470743232.ch8"},{"key":"ref4","first-page":"171","article-title":"Syntactic stylometry for deception detection","volume-title":"Proc. 50th Annu. Meeting Assoc. Comput. Linguistics","author":"Feng"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2005-580"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3115\/1667583.1667679"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/415035a"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2820758"},{"issue":"3\/4","key":"ref10","first-page":"273","article-title":"The MUMIN coding scheme for the annotation of feedback, turn management and sequencing phenomena","volume-title":"Lang. Resour. Eval.","volume":"41","author":"Allwood","year":"2007"},{"key":"ref11","first-page":"48","article-title":"A rigidity detection system for the guilty knowledge test","volume-title":"Proc. Symp. Credibility Assessment Inf. Qual. Government Bus.","author":"Twyman"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1037\/h0093929"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"ref14","volume-title":"Linguistic Inquiry and Word Count: LIWC [Software Manual]","author":"Pennebaker","year":"1999"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1037\/t27734-000"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2018.00019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.35.5.345"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0956797614524421"},{"key":"ref19","first-page":"111","article-title":"Development of exploratory research tools based on TANDEM-STRAIGHT","volume-title":"Proc. Asia-Pacific Signal Inf. Process. Assoc. Annu. Summit Conf.","author":"Kawahara"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2057192"},{"key":"ref21","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inform. Process. Syst.","author":"Paszke"},{"key":"ref22","article-title":"Google Cloud speech-to-text recognition software","year":"2019"},{"issue":"1","key":"ref23","first-page":"6","article-title":"Who can best catch a liar? A meta-analysis of individual differences in detecting deception","volume":"15","author":"Aamodt","year":"2006","journal-title":"Forensic Examiner"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.01.009"},{"key":"ref25","first-page":"309","article-title":"Finding deceptive opinion spam by any stretch of the imagination","volume-title":"Proc. 49th Annu. Meeting Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Ott"},{"key":"ref26","volume-title":"Statistics and Machine Learning Toolbox","year":"2010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1177\/1088868314556539"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3115\/1599081.1599087"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718921"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.010"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718922"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/08939302020003005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14505001116"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"ref35","first-page":"1341","article-title":"Using deep linguistic features for finding deceptive opinion spam","volume-title":"Proc. COLING 2012: Posters","author":"Xu"},{"key":"ref36","first-page":"15","article-title":"Seeing through deception: A computational approach to deceit detection in written communication","volume-title":"Proc. Workshop Comput. Approaches Deception Detection","author":"Almela"},{"key":"ref37","first-page":"944","article-title":"Automatic detection of deception in child-produced speech using syntactic complexity features","volume-title":"Proc. 51st Annu. Meeting Assoc. Comput. Linguistics","author":"Yancheva"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1186\/s13388-014-0008-2"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X15586792"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-679X.2012.00450.x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-679X.2012.00448.x"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2004.11045779"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-012-9300-z"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/0163853X.2014.942833"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/1099-0720(200103\/04)15:2<187::AID-ACP696>3.0.CO;2-A"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-013-9140-4"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1177\/0959354311427487"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5494961"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1117\/2.1201101.003452"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/10683160701645181"},{"key":"ref52","volume-title":"Telling Lies: Clues to Deceit in the Marketplace, Politics and Marriage","author":"Ekman","year":"2001"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1196\/annals.1280.010"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195179644.001.0001"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.4304\/jmm.1.6.22-35"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-27257-7_12"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEA.2012.6462897"},{"key":"ref58","doi-asserted-by":"crossref","DOI":"10.1117\/2.1201201.004095","volume-title":"Automatic Identification of Facial Clues to Lies","author":"Pfister","year":"2012"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.122"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2005.1521550"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.85"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s10919-005-0001-z"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1515\/semi.2010.055"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34584-5_36"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8333.2011.02014.x"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2008.2011700"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-009-9171-0"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284309"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2388676.2388714"},{"key":"ref70","first-page":"3118","article-title":"A multimodal dataset for deception detection","volume-title":"Proc. Conf. Lang. Resour. Eval.","author":"Prez-Rosas"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663229"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2639344"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477553"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2502081.2502224"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0137"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11502"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23793-5_8"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621909"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MIPR.2019.00108"}],"container-title":["IEEE Transactions on Affective Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5165369\/9724151\/09165161.pdf?arnumber=9165161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:34:50Z","timestamp":1704843290000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9165161\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":80,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/taffc.2020.3015684","relation":{},"ISSN":["1949-3045","2371-9850"],"issn-type":[{"value":"1949-3045","type":"electronic"},{"value":"2371-9850","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}