{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:15Z","timestamp":1750220175541,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,16]],"date-time":"2021-10-16T00:00:00Z","timestamp":1634342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research & Development Program of China","award":["2018YFB1702803"],"award-info":[{"award-number":["2018YFB1702803"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,16]]},"DOI":"10.1145\/3503181.3503220","type":"proceedings-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T23:13:40Z","timestamp":1646176420000},"page":"8-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Collaboration interaction prediction in crowdsourcing via temporal network"],"prefix":"10.1145","author":[{"given":"Yiqin","family":"Luo","sequence":"first","affiliation":[{"name":"South University of Science and Technology, China"}]},{"given":"Tongda","family":"Zhang","sequence":"additional","affiliation":[{"name":"South University of Science and Technology, China"}]},{"given":"Xiao","family":"Sun","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for E commerce Technologies, Tsinghua University, China"}]},{"given":"Minyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Computer Science and Technology, Beijing Normal University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2019.00276"},{"key":"e_1_3_2_1_2_1","volume-title":"Automatic Long-Term Deception Detection in Group Interaction Videos. In 2019 IEEE International Conference on Multimedia and Expo (ICME). 1600\u20131605","author":"Bai Chongyang","year":"2019","unstructured":"Chongyang Bai , Maksim Bolonkin , Judee Burgoon , Chao Chen , Norah Dunbar , Bharat Singh , V.\u00a0 S. Subrahmanian , and Zhe Wu . 2019 . Automatic Long-Term Deception Detection in Group Interaction Videos. In 2019 IEEE International Conference on Multimedia and Expo (ICME). 1600\u20131605 . https:\/\/doi.org\/10.1109\/ICME.2019.00276 Chongyang Bai, Maksim Bolonkin, Judee Burgoon, Chao Chen, Norah Dunbar, Bharat Singh, V.\u00a0S. Subrahmanian, and Zhe Wu. 2019. Automatic Long-Term Deception Detection in Group Interaction Videos. In 2019 IEEE International Conference on Multimedia and Expo (ICME). 1600\u20131605. https:\/\/doi.org\/10.1109\/ICME.2019.00276"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Chongyang Bai Maksim Bolonkin Srijan Kumar Jure Leskovec Judee\u00a0K Burgoon Norah\u00a0E Dunbar and VS Subrahmanian. 2019. Predicting dominance in multi-person videos.. In IJCAI. 4643\u20134650. Chongyang Bai Maksim Bolonkin Srijan Kumar Jure Leskovec Judee\u00a0K Burgoon Norah\u00a0E Dunbar and VS Subrahmanian. 2019. Predicting dominance in multi-person videos.. In IJCAI. 4643\u20134650.","DOI":"10.24963\/ijcai.2019\/645"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2740062"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1219092.1219093"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2820745"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818346.2820745"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2016.09.005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijproman.2021.01.005"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3265754"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5984"},{"volume-title":"Detecting lies and deceit: Pitfalls and opportunities","author":"Vrij Aldert","key":"e_1_3_2_1_12_1","unstructured":"Aldert Vrij . 2008. Detecting lies and deceit: Pitfalls and opportunities . John Wiley & Sons . Aldert Vrij. 2008. Detecting lies and deceit: Pitfalls and opportunities. John Wiley & Sons."},{"key":"e_1_3_2_1_13_1","unstructured":"Yanbang Wang Yen-Yu Chang Yunyu Liu Jure Leskovec and Pan Li. 2021. Inductive Representation Learning in Temporal Networks via Causal Anonymous Walks. arXiv preprint arXiv:2101.05974(2021). Yanbang Wang Yen-Yu Chang Yunyu Liu Jure Leskovec and Pan Li. 2021. Inductive Representation Learning in Temporal Networks via Causal Anonymous Walks. arXiv preprint arXiv:2101.05974(2021)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0693-z"}],"event":{"name":"ICCSE '21: 5th International Conference on Crowd Science and Engineering","acronym":"ICCSE '21","location":"Jinan China"},"container-title":["5th International Conference on Crowd Science and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503181.3503220","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503181.3503220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:49Z","timestamp":1750186849000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503181.3503220"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,16]]},"references-count":14,"alternative-id":["10.1145\/3503181.3503220","10.1145\/3503181"],"URL":"https:\/\/doi.org\/10.1145\/3503181.3503220","relation":{},"subject":[],"published":{"date-parts":[[2021,10,16]]},"assertion":[{"value":"2022-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}