{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T07:12:25Z","timestamp":1772262745051,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-20-1-0254"],"award-info":[{"award-number":["W911NF-20-1-0254"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-19-S-F009"],"award-info":[{"award-number":["N00014-19-S-F009"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF 1950297, DGE 1433817"],"award-info":[{"award-number":["CCF 1950297, DGE 1433817"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3519358","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"349-351","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Does Deception Leave a Content Independent Stylistic Trace?"],"prefix":"10.1145","author":[{"given":"Victor","family":"Zeng","sequence":"first","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]},{"given":"Xuting","family":"Liu","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"Rakesh M.","family":"Verma","sequence":"additional","affiliation":[{"name":"University of Houston, Houston, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5513"},{"key":"e_1_3_2_2_2_1","volume-title":"Proc. 2019 Conf. of the NAACL: HLT","volume":"1","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2019 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding . In Proc. 2019 Conf. of the NAACL: HLT , Vol. 1 . 4171--4186. Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In Proc. 2019 Conf. of the NAACL: HLT, Vol. 1. 4171--4186."},{"key":"e_1_3_2_2_3_1","first-page":"3","article-title":"Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace","volume":"52","author":"Gr\u00f6ndahl T.","year":"2019","unstructured":"T. Gr\u00f6ndahl and N. Asokan . 2019 . Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace ? ACM Comput. Surv. 52 , 3 (jun 2019), 36 pages. T. Gr\u00f6ndahl and N. Asokan. 2019. Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? ACM Comput. Surv. 52, 3 (jun 2019), 36 pages.","journal-title":"ACM Comput. Surv."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2409-2"},{"key":"e_1_3_2_2_5_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692","author":"Liu Y.","year":"2019","unstructured":"Y. Liu , M. Ott , N. Goyal , J. Du , M. Joshi , D. Chen , O. Levy , M. Lewis , L. Zettlemoyer , and V. Stoyanov . 2019 . Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019). Y. Liu, M. Ott, N. Goyal, J. Du, M. Joshi, D. Chen, O. Levy, M. Lewis, L. Zettlemoyer, and V. Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"key":"e_1_3_2_2_6_1","volume-title":"Pervasive label errors in test sets destabilize machine learning benchmarks. arXiv preprint arXiv:2103.14749","author":"Northcutt Curtis G","year":"2021","unstructured":"Curtis G Northcutt , Anish Athalye , and Jonas Mueller . 2021. Pervasive label errors in test sets destabilize machine learning benchmarks. arXiv preprint arXiv:2103.14749 ( 2021 ). Curtis G Northcutt, Anish Athalye, and Jonas Mueller. 2021. Pervasive label errors in test sets destabilize machine learning benchmarks. arXiv preprint arXiv:2103.14749 (2021)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12125"},{"key":"e_1_3_2_2_8_1","volume-title":"Pattern Recognition and Information Forensics - ICPR 2018 International Workshops, CVAUI, IWCF, and MIPPSNA. 164--177","author":"Rill-Garc\u00eda Rodrigo","year":"2018","unstructured":"Rodrigo Rill-Garc\u00eda , Luis Villase\u00f1or Pineda , Ver\u00f3nica Reyes-Meza , and Hugo Jair Escalante . 2018 . From Text to Speech: A Multimodal Cross-Domain Approach for Deception Detection . In Pattern Recognition and Information Forensics - ICPR 2018 International Workshops, CVAUI, IWCF, and MIPPSNA. 164--177 . Rodrigo Rill-Garc\u00eda, Luis Villase\u00f1or Pineda, Ver\u00f3nica Reyes-Meza, and Hugo Jair Escalante. 2018. From Text to Speech: A Multimodal Cross-Domain Approach for Deception Detection. In Pattern Recognition and Information Forensics - ICPR 2018 International Workshops, CVAUI, IWCF, and MIPPSNA. 164--177."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.04.020"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Ian Tenney James Wexler Jasmijn Bastings Tolga Bolukbasi Andy Coenen Sebastian Gehrmann Ellen Jiang Mahima Pushkarna Carey Radebaugh Emily Reif and Ann Yuan. 2020. The Language Interpretability Tool: Extensible Interactive Visualizations and Analysis for NLP Models. 107--118 pages.  Ian Tenney James Wexler Jasmijn Bastings Tolga Bolukbasi Andy Coenen Sebastian Gehrmann Ellen Jiang Mahima Pushkarna Carey Radebaugh Emily Reif and Ann Yuan. 2020. The Language Interpretability Tool: Extensible Interactive Visualizations and Analysis for NLP Models. 107--118 pages.","DOI":"10.18653\/v1\/2020.emnlp-demos.15"},{"key":"#cr-split#-e_1_3_2_2_11_1.1","unstructured":"Pawan Kumar Verma Prateek Agrawal and Radu Prodan. 2021. WELFake dataset for fake news detection in text data. https:\/\/doi.org\/10.5281\/zenodo.4561253 10.5281\/zenodo.4561253"},{"key":"#cr-split#-e_1_3_2_2_11_1.2","unstructured":"Pawan Kumar Verma Prateek Agrawal and Radu Prodan. 2021. WELFake dataset for fake news detection in text data. https:\/\/doi.org\/10.5281\/zenodo.4561253"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363267"},{"key":"e_1_3_2_2_13_1","volume-title":"Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset. Future Internet 9, 1","author":"Vidros Sokratis","year":"2017","unstructured":"Sokratis Vidros , Constantinos Kolias , Georgios Kambourakis , and Leman Akoglu . 2017. Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset. Future Internet 9, 1 ( 2017 ). Sokratis Vidros, Constantinos Kolias, Georgios Kambourakis, and Leman Akoglu. 2017. Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset. Future Internet 9, 1 (2017)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375708.3380313"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA","acronym":"CODASPY '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519358","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3519358","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3519358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:40Z","timestamp":1750188640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3519358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":15,"alternative-id":["10.1145\/3508398.3519358","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3519358","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}