{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T04:58:05Z","timestamp":1776056285843,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1344257"],"award-info":[{"award-number":["1344257"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1355633"],"award-info":[{"award-number":["1355633"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000925","name":"John Templeton Foundation","doi-asserted-by":"publisher","award":["48503"],"award-info":[{"award-number":["48503"]}],"id":[{"id":"10.13039\/100000925","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"DARPA-BAA-12-47 DEFT","doi-asserted-by":"publisher","award":["12475008"],"award-info":[{"award-number":["12475008"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/tifs.2016.2639344","type":"journal-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T19:24:16Z","timestamp":1481657056000},"page":"1042-1055","source":"Crossref","is-referenced-by-count":77,"title":["Detecting Deceptive Behavior via Integration of Discriminative Features From Multiple Modalities"],"prefix":"10.1109","volume":"12","author":[{"given":"Mohamed","family":"Abouelenien","sequence":"first","affiliation":[]},{"given":"Veronica","family":"Perez-Rosas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0767-6703","authenticated-orcid":false,"given":"Rada","family":"Mihalcea","sequence":"additional","affiliation":[]},{"given":"Mihai","family":"Burzo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"91","article-title":"Early blooming and late blooming syntactic structures","author":"hunt","year":"1977","journal-title":"Evaluating Writing Describing Measuring Judging"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1075\/ijcl.15.4.02lu"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-009-9171-0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2820758"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1281"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663229"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X09351676"},{"key":"ref36","author":"pennebaker","year":"1999","journal-title":"Linguistic Inquiry and Word Count LIWC"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2008.2011700"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284309"},{"key":"ref10","author":"ekman","year":"2001","journal-title":"Telling Lies Clues to Deceit in the Marketplace Politics and Marriage"},{"key":"ref40","first-page":"593","article-title":"Good features to track","author":"shi","year":"1994","journal-title":"Proc IEEE CVPR"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEA.2012.6462897"},{"key":"ref12","author":"pfister","year":"2012","journal-title":"Electronic Imaging Signal Processing Automatic Identification of Facial Clues to Lies"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8333.2011.02014.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34584-5_36"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21741-8_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/1529100610390861"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.21437\/Interspeech.2005-580","article-title":"Distinguishing deceptive from non-deceptive speech","author":"hirschberg","year":"2005","journal-title":"Proc Interspeech-Eurospeech"},{"key":"ref18","first-page":"23b","article-title":"Modality effects in deception detection and applications in automatic-deception-detection","author":"qin","year":"2005","journal-title":"Proc 38th Hawaii Int Conf Syst Sci"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3115\/1667583.1667679"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2317309"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr1003_2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TBME.2012.2232927"},{"key":"ref3","first-page":"129","author":"gannon","year":"2009","journal-title":"Risk Assessment and the Polygraph"},{"key":"ref6","author":"vrij","year":"2001","journal-title":"Detecting Lies and Deceit The Psychology of Lying and the Implications for Professional Practice"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6288219"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1080\/10683160701645181"},{"key":"ref8","author":"maschke","year":"2005","journal-title":"The Lie Behind the Lie Detector"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2009.02308.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/0959354311427487"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1176\/appi.neuropsych.16.3.295"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"ref20","first-page":"39","article-title":"On the use of homogenous sets of subjects in deceptive language analysis","author":"fornaciari","year":"2012","journal-title":"Proc Workshop Comput Approaches Deception Detection"},{"key":"ref45","first-page":"665","article-title":"Bayesian comparison of machine learning algorithms on single and multiple datasets","volume":"22","author":"lacoste","year":"2012","journal-title":"Proc 15th Int Conf Artif Intell Statist (AISTATS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1117\/12.547806"},{"key":"ref21","first-page":"171","article-title":"Syntactic stylometry for deception detection","author":"feng","year":"2012","journal-title":"Proc Annual Meeting of the Assoc Computational Linguistics"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.675"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-010-9251-3"},{"key":"ref41","article-title":"GPU-based video feature tracking and matching","author":"sinha","year":"2006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.1315054"},{"key":"ref44","first-page":"23","article-title":"An exploratory study on promising cues in deception detection and application of decision tree","author":"qin","year":"2004","journal-title":"Proc 37th Annu Hawaii Int Conf Syst Sci"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MEMB.2002.1175139"},{"key":"ref43","author":"hartley","year":"2003","journal-title":"Multiple View Geometry in Computer Vision"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2001.1017374"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/10206\/7862329\/7782429-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7862329\/07782429.pdf?arnumber=7782429","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T02:28:00Z","timestamp":1658024880000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7782429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":45,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2639344","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5]]}}}