{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:05:51Z","timestamp":1776110751085,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T00:00:00Z","timestamp":1447027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["#1344257 and #1355633"],"award-info":[{"award-number":["#1344257 and #1355633"]}]},{"name":"DARPA-BAA-12-47 DEFT","award":["#12475008"],"award-info":[{"award-number":["#12475008"]}]},{"name":"John Templeton Foundation","award":["#48503"],"award-info":[{"award-number":["#48503"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,9]]},"DOI":"10.1145\/2818346.2820758","type":"proceedings-article","created":{"date-parts":[[2015,11,6]],"date-time":"2015-11-06T14:23:40Z","timestamp":1446819820000},"page":"59-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":185,"title":["Deception Detection using Real-life Trial Data"],"prefix":"10.1145","author":[{"given":"Ver\u00f3nica","family":"P\u00e9rez-Rosas","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Mohamed","family":"Abouelenien","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Rada","family":"Mihalcea","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Mihai","family":"Burzo","sequence":"additional","affiliation":[{"name":"University of Michigan - Flint, Flint, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,11,9]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"6","article-title":"Who can best catch a liar? a meta-analysis of individual differences in detecting deception","volume":"15","author":"Aamodt M.","year":"2006","unstructured":"M. Aamodt and H. Custer . Who can best catch a liar? a meta-analysis of individual differences in detecting deception . Forensic Examiner , 15 ( 1 ): 6 -- 11 , 2006 . M. Aamodt and H. Custer. Who can best catch a liar? a meta-analysis of individual differences in detecting deception. Forensic Examiner, 15(1):6--11, 2006.","journal-title":"Forensic Examiner"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663204.2663229"},{"key":"e_1_3_2_1_3_1","volume-title":"The mumin coding scheme for the annotation of feedback, turn management and sequencing phenomena. Language Resources and Evaluation, 41(3--4):273--287","author":"Allwood J.","year":"2007","unstructured":"J. Allwood , L. Cerrato , K. Jokinen , C. Navarretta , and P. Paggio . The mumin coding scheme for the annotation of feedback, turn management and sequencing phenomena. Language Resources and Evaluation, 41(3--4):273--287 , 2007 . J. Allwood, L. Cerrato, K. Jokinen, C. Navarretta, and P. Paggio. The mumin coding scheme for the annotation of feedback, turn management and sequencing phenomena. Language Resources and Evaluation, 41(3--4):273--287, 2007."},{"key":"e_1_3_2_1_4_1","first-page":"15","volume-title":"Proceedings of the Workshop on Computational Approaches to Deception Detection","author":"Almela A.","year":"2012","unstructured":"A. Almela , R. Valencia-Garc\u00eda , and P. Cantos . Seeing through deception: A computational approach to deceit detection in written communication . In Proceedings of the Workshop on Computational Approaches to Deception Detection , pages 15 -- 22 , Avignon, France , April 2012 . Association for Computational Linguistics. A. Almela, R. Valencia-Garc\u00eda, and P. Cantos. Seeing through deception: A computational approach to deceit detection in written communication. In Proceedings of the Workshop on Computational Approaches to Deception Detection, pages 15--22, Avignon, France, April 2012. Association for Computational Linguistics."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2008.2011700"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10919-005-0001-z"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5494961"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1515\/semi.2010.055"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.129.1.74"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/0959354311427487"},{"key":"e_1_3_2_1_11_1","volume-title":"Telling Lies: Clues to Deceit in the Marketplace, Politics and Marriage","author":"Ekman P.","year":"2001","unstructured":"P. Ekman . Telling Lies: Clues to Deceit in the Marketplace, Politics and Marriage . Norton, W.W. and Company , 2001 . P. Ekman. Telling Lies: Clues to Deceit in the Marketplace, Politics and Marriage. Norton, W.W. and Company, 2001."},{"key":"e_1_3_2_1_12_1","volume-title":"deception, and facial expression. Annals of the New York Academy of Sciences, 1000(EMOTIONS INSIDE OUT: 130 Years after Darwin's The Expression of the Emotions in Man and Animals):205--221","author":"Ekman P.","year":"2003","unstructured":"P. Ekman . Darwin , deception, and facial expression. Annals of the New York Academy of Sciences, 1000(EMOTIONS INSIDE OUT: 130 Years after Darwin's The Expression of the Emotions in Man and Animals):205--221 , 2003 . P. Ekman. Darwin, deception, and facial expression. Annals of the New York Academy of Sciences, 1000(EMOTIONS INSIDE OUT: 130 Years after Darwin's The Expression of the Emotions in Man and Animals):205--221, 2003."},{"key":"e_1_3_2_1_13_1","first-page":"171","volume-title":"Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers -","volume":"2","author":"Feng S.","year":"2012","unstructured":"S. Feng , R. Banerjee , and Y. Choi . Syntactic stylometry for deception detection . In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers - Volume 2 , ACL '12, pages 171 -- 175 , Stroudsburg, PA, USA , 2012 . Association for Computational Linguistics. S. Feng, R. Banerjee, and Y. Choi. Syntactic stylometry for deception detection. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers - Volume 2, ACL '12, pages 171--175, Stroudsburg, PA, USA, 2012. Association for Computational Linguistics."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-013-9140-4"},{"key":"e_1_3_2_1_15_1","first-page":"129","volume-title":"Risk Assessment and the Polygraph","author":"Gannon T.","year":"2009","unstructured":"T. Gannon , A. Beech , and T. Ward . Risk Assessment and the Polygraph , pages 129 -- 154 . John Wiley and Sons Ltd , 2009 . T. Gannon, A. Beech, and T. Ward. Risk Assessment and the Polygraph, pages 129--154. John Wiley and Sons Ltd, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10683160701645181"},{"key":"e_1_3_2_1_17_1","volume-title":"Exonerations in the USA","author":"Gross S.","year":"1989","unstructured":"S. Gross and R. Warden . Exonerations in the USA , 1989 - 2012. Technical report, National Registry of Exonerations , 2012. S. Gross and R. Warden. Exonerations in the USA, 1989 - 2012. Technical report, National Registry of Exonerations, 2012."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.010"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2044-8333.2011.02014.x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","first-page":"1833","DOI":"10.21437\/Interspeech.2005-580","volume-title":"In Proceedings of Interspeech 2005 - Eurospeech","author":"Hirschberg J.","year":"2005","unstructured":"J. Hirschberg , S. Benus , J. Brenier , F. Enos , S. Friedman , S. Gilman , C. Gir , G. Graciarena , A. Kathol , and L. Michaelis . Distinguishing deceptive from non-deceptive speech . In In Proceedings of Interspeech 2005 - Eurospeech , pages 1833 -- 1836 , 2005 . J. Hirschberg, S. Benus, J. Brenier, F. Enos, S. Friedman, S. Gilman, C. Gir, G. Graciarena, A. Kathol, and L. Michaelis. Distinguishing deceptive from non-deceptive speech. In In Proceedings of Interspeech 2005 - Eurospeech, pages 1833--1836, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2655780.2655897"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10726-009-9171-0"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/08939302020003005"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.122"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34584-5_36"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.85"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1667583.1667679"},{"key":"e_1_3_2_1_29_1","first-page":"29","article-title":"Lying words: Predicting deception from linguistic styles","author":"Newman M.","year":"2003","unstructured":"M. Newman , J. Pennebaker , D. Berry , and J. Richards . Lying words: Predicting deception from linguistic styles . Personality and Social Psychology Bulletin , 29 , 2003 . M. Newman, J. Pennebaker, D. Berry, and J. Richards. Lying words: Predicting deception from linguistic styles. Personality and Social Psychology Bulletin, 29, 2003.","journal-title":"Personality and Social Psychology Bulletin"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284309"},{"key":"e_1_3_2_1_31_1","first-page":"309","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies -","volume":"1","author":"Ott M.","year":"2011","unstructured":"M. Ott , Y. Choi , C. Cardie , and J. Hancock . Finding deceptive opinion spam by any stretch of the imagination . In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1 , HLT '11, pages 309 -- 319 , Stroudsburg, PA, USA , 2011 . Association for Computational Linguistics. M. Ott, Y. Choi, C. Cardie, and J. Hancock. Finding deceptive opinion spam by any stretch of the imagination. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, HLT '11, pages 309--319, Stroudsburg, PA, USA, 2011. Association for Computational Linguistics."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEA.2012.6462897"},{"key":"e_1_3_2_1_33_1","volume-title":"Human behaviour: Seeing through the face of deception. Nature, 415(6867)","author":"Pavlidis I.","year":"2002","unstructured":"I. Pavlidis , N. Eberhardt , and J. Levine . Human behaviour: Seeing through the face of deception. Nature, 415(6867) , 2002 . I. Pavlidis, N. Eberhardt, and J. Levine. Human behaviour: Seeing through the face of deception. Nature, 415(6867), 2002."},{"key":"e_1_3_2_1_34_1","volume-title":"Linguistic inquiry and word count: LIWC","author":"Pennebaker J.","year":"1999","unstructured":"J. Pennebaker and M. Francis . Linguistic inquiry and word count: LIWC , 1999 . Erlbaum Publishers . J. Pennebaker and M. Francis. Linguistic inquiry and word count: LIWC, 1999. Erlbaum Publishers."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Conference on Language Resources and Evaluations (LREC 2014","author":"Perez-Rosas V.","year":"2014","unstructured":"V. Perez-Rosas , R. Mihalcea , A. Narvaez , and M. Burzo . A multimodal dataset for deception detection . In Proceedings of the Conference on Language Resources and Evaluations (LREC 2014 ), Reykjavik, Iceland , May 2014 . V. Perez-Rosas, R. Mihalcea, A. Narvaez, and M. Burzo. A multimodal dataset for deception detection. In Proceedings of the Conference on Language Resources and Evaluations (LREC 2014), Reykjavik, Iceland, May 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1117\/2.1201201.004095"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1117\/2.1201101.003452"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-27257-7_12"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718921"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2005.1521550"},{"key":"e_1_3_2_1_41_1","series-title":"Wiley series in the psychology of crime","volume-title":"The Psychology of Lying and the Implications for Professional Practice","author":"Vrij A.","year":"2001","unstructured":"A. Vrij . Detecting Lies and Deceit : The Psychology of Lying and the Implications for Professional Practice . Wiley series in the psychology of crime , policing and law. Wiley , 2001 . A. Vrij. Detecting Lies and Deceit: The Psychology of Lying and the Implications for Professional Practice. Wiley series in the psychology of crime, policing and law. Wiley, 2001."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718922"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of COLING 2012: Posters, pages 1341--1350, Mumbai, India, December 2012. The COLING 2012 Organizing Committee.","author":"Xu Q.","unstructured":"Q. Xu and H. Zhao . Using deep linguistic features for finding deceptive opinion spam . In Proceedings of COLING 2012: Posters, pages 1341--1350, Mumbai, India, December 2012. The COLING 2012 Organizing Committee. Q. Xu and H. Zhao. Using deep linguistic features for finding deceptive opinion spam. In Proceedings of COLING 2012: Posters, pages 1341--1350, Mumbai, India, December 2012. The COLING 2012 Organizing Committee."},{"key":"e_1_3_2_1_44_1","first-page":"944","volume-title":"Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)","author":"Yancheva M.","year":"2013","unstructured":"M. Yancheva and F. Rudzicz . Automatic detection of deception in child-produced speech using syntactic complexity features . In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) , pages 944 -- 953 , Sofia, Bulgaria , August 2013 . Association for Computational Linguistics. M. Yancheva and F. Rudzicz. Automatic detection of deception in child-produced speech using syntactic complexity features. In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pages 944--953, Sofia, Bulgaria, August 2013. Association for Computational Linguistics."}],"event":{"name":"ICMI '15: INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION","location":"Seattle Washington USA","acronym":"ICMI '15","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2015 ACM on International Conference on Multimodal Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818346.2820758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818346.2820758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:25Z","timestamp":1750223245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818346.2820758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,9]]},"references-count":44,"alternative-id":["10.1145\/2818346.2820758","10.1145\/2818346"],"URL":"https:\/\/doi.org\/10.1145\/2818346.2820758","relation":{},"subject":[],"published":{"date-parts":[[2015,11,9]]},"assertion":[{"value":"2015-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}