Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation
暂无分享,去创建一个
[2] Fadi A. Thabtah,et al. Deriving Correlated Sets of Website Features for Phishing Detection: A Computational Intelligence Approach , 2016, J. Inf. Knowl. Manag..
[3] W. Casscells,et al. Interpretation by physicians of clinical laboratory results. , 1978, The New England journal of medicine.
[4] Leslie M. Collins,et al. Financial fraud detection using vocal, linguistic and financial cues , 2015, Decis. Support Syst..
[5] Alexander F. Gelbukh,et al. Cross-domain deception detection using support vector networks , 2016, Soft Computing.
[6] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[7] Jay F. Nunamaker,et al. Special Issue: Information Systems for Deception Detection , 2016, J. Manag. Inf. Syst..
[8] Dongsong Zhang,et al. What Online Reviewer Behaviors Really Matter? Effects of Verbal and Nonverbal Behaviors on Detection of Fake Online Reviews , 2016, J. Manag. Inf. Syst..
[9] Xiuwen Liu,et al. Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication , 2016, J. Manag. Inf. Syst..
[10] Lawrence A. Farwell,et al. Brain fingerprinting field studies comparing P300-MERMER and P300 brainwave responses in the detection of concealed information , 2012, Cognitive Neurodynamics.
[11] P. Walley. Statistical Reasoning with Imprecise Probabilities , 1990 .
[12] J.F. Nunamaker,et al. Moving toward intent detection: a tool-based approach , 2004, Proceedings. The 7th International IEEE Conference on Intelligent Transportation Systems (IEEE Cat. No.04TH8749).
[13] Robert W. Zmud,et al. Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study , 2002, MIS Q..
[14] Xavier Robin,et al. pROC: an open-source package for R and S+ to analyze and compare ROC curves , 2011, BMC Bioinformatics.
[15] John A. Swets,et al. CHAPTER 11 – Illustrative Evaluation of Imaging Systems , 1982 .
[16] A. Giordano,et al. Detection and estimation theory and its applications , 2006 .
[17] Christophe Mues,et al. An experimental comparison of classification algorithms for imbalanced credit scoring data sets , 2012, Expert Syst. Appl..
[18] Ewout H. Meijer,et al. Memory detection with the Concealed Information Test: a meta analysis of skin conductance, respiration, heart rate, and P300 data. , 2014, Psychophysiology.
[19] Charles R. Honts,et al. Information Gain of Psychophysiological Detection of Deception in Forensic and Screening Settings , 2009, Applied psychophysiology and biofeedback.
[20] Matthew L. Jensen,et al. Detecting Concealment of Intent in Transportation Screening: A Proof of Concept , 2009, IEEE Transactions on Intelligent Transportation Systems.
[21] D. M. Green,et al. Signal detection theory and psychophysics , 1966 .
[22] Mark A. Burgman,et al. Facilitated expert judgment of environmental risks: acquiring and analysing imprecise data , 2012 .
[23] Nathan W. Twyman,et al. Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection , 2015, J. Manag. Inf. Syst..
[24] Timothy W. Armistead. The detection of deception by linguistic means , 2012 .
[26] P. A. Mileman. Decision making in health care. Theory, psychology, and applications , 2001 .
[27] Max Kuhn,et al. Building Predictive Models in R Using the caret Package , 2008 .
[28] N. Perkins,et al. The inconsistency of "optimal" cutpoints obtained using two criteria based on the receiver operating characteristic curve. , 2006, American journal of epidemiology.
[29] S. L. Sporer,et al. Are Computers Effective Lie Detectors? A Meta-Analysis of Linguistic Cues to Deception , 2015, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.
[30] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[31] G. Wells,et al. Eyewitness identification: Bayesian information gain, base-rate effect equivalency curves, and reasonable suspicion. , 2015, Law and human behavior.
[32] Kurt Hornik,et al. kernlab - An S4 Package for Kernel Methods in R , 2004 .
[33] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[34] Matthew L. Jensen,et al. Deception detection through automatic, unobtrusive analysis of nonverbal behavior , 2005, IEEE Intelligent Systems.
[35] Rahil Hosseini,et al. A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.
[36] Laboratory and Field Research on the Ocular-motor Deception Test , 2016 .
[37] J. Nunamaker,et al. Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .
[38] Rick L. Wilson,et al. Decision support for determining veracity via linguistic-based cues , 2009, Decis. Support Syst..
[39] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[40] William J. Mayew,et al. Analyzing Speech to Detect Financial Misreporting , 2011 .
[41] Rachael Briggs,et al. Normative Theories of Rational Choice: Expected Utility , 2014 .
[42] Galit Nahari,et al. When the long road is the shortcut: a comparison between two coding methods for content-based lie-detection tools , 2016 .
[43] Jay F. Nunamaker,et al. A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..
[44] D. Larcker,et al. Detecting Deceptive Discussions in Conference Calls , 2012 .
[45] Jay F. Nunamaker,et al. Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals , 2014, J. Manag. Inf. Syst..
[46] Yuntao Qian,et al. Network Intrusion Detection through Discriminative Feature Selection by Using Sparse Logistic Regression , 2017, Future Internet.
[47] Detmar W. Straub,et al. Coping With Systems Risk: Security Planning Models for Management Decision Making , 1998, MIS Q..
[48] Mohak Shah,et al. Evaluating Learning Algorithms: A Classification Perspective , 2011 .
[49] Arjun Mukherjee,et al. Spotting fake reviewer groups in consumer reviews , 2012, WWW.
[50] Eitan Elaad,et al. Effects of context and state of guilt on the detection of concealed crime information. , 2009, International journal of psychophysiology : official journal of the International Organization of Psychophysiology.
[51] Elizabeth A. Olson,et al. Eyewitness identification: information gain from incriminating and exonerating behaviors. , 2002, Journal of experimental psychology. Applied.
[52] Amit V. Deokar,et al. Detecting Fraudulent Behavior on Crowdfunding Platforms: The Role of Linguistic and Content-Based Cues in Static and Dynamic Contexts , 2016, J. Manag. Inf. Syst..
[53] Dvijesh Shastri,et al. Imaging Facial Physiology for the Detection of Deceit , 2006, International Journal of Computer Vision.
[54] C. Honts,et al. Automation of a screening polygraph test increases accuracy , 2007 .
[55] Xiaoning Zhang,et al. Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods , 2001, Decis. Sci..
[56] Azizollah Memariani,et al. Suspicious Behavior Detection in Debit Card Transactions using Data Mining: A Comparative Study using Hybrid Models , 2015, Inf. Resour. Manag. J..
[57] M. Yaffe,et al. American Cancer Society Guidelines for Breast Screening with MRI as an Adjunct to Mammography , 2007, CA: a cancer journal for clinicians.
[58] Douglas J. Hacker,et al. Lyin' eyes: ocular-motor measures of reading reveal deception. , 2012, Journal of experimental psychology. Applied.
[59] David M. W. Powers,et al. Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation , 2011, ArXiv.
[60] A. Vrij,et al. Thermal Imaging as a Lie Detection Tool at Airports , 2011, Law and human behavior.
[61] David B. Dunson,et al. Bayesian data analysis, third edition , 2013 .
[62] Sadie Creese,et al. Automated Insider Threat Detection System Using User and Role-Based Profile Assessment , 2017, IEEE Systems Journal.