It Takes Two to Lie: One to Lie, and One to Listen
暂无分享,去创建一个
Cristian Danescu-Niculescu-Mizil | Jordan L. Boyd-Graber | Denis Peskov | Joe Barrow | Ahmed Elgohary | Benny Cheng | Ahmed Elgohary | Cristian Danescu-Niculescu-Mizil | Denis Peskov | Joe Barrow | Benny Cheng
[1] Zhi-Hua Zhou,et al. Ieee Transactions on Knowledge and Data Engineering 1 Training Cost-sensitive Neural Networks with Methods Addressing the Class Imbalance Problem , 2022 .
[2] Claire Cardie,et al. Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.
[3] Alex Black,et al. Truths, Lies, and Equivocations: The Effects of Conflicting Goals on Discourse , 1990 .
[4] Yonatan Belinkov,et al. Analysis Methods in Neural Language Processing: A Survey , 2018, TACL.
[5] Claire Cardie,et al. Estimating the prevalence of deception in online review communities , 2012, WWW.
[6] Justin Cheng,et al. Don’t Let Me Be Misunderstood:Comparing Intentions and Perceptions in Online Discussions , 2020, WWW.
[7] Cristian Danescu-Niculescu-Mizil,et al. Linguistic Harbingers of Betrayal: A Case Study on an Online Strategy Game , 2015, ACL.
[8] Massimo Poesio,et al. Automatic deception detection in Italian court cases , 2013, Artificial Intelligence and Law.
[9] Verónica Pérez-Rosas,et al. Automatic Detection of Fake News , 2017, COLING.
[10] David Bamman,et al. Contextualized Sarcasm Detection on Twitter , 2015, ICWSM.
[11] Nina Wacholder,et al. Identifying Sarcasm in Twitter: A Closer Look , 2011, ACL.
[12] Jure Leskovec,et al. A computational approach to politeness with application to social factors , 2013, ACL.
[13] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[14] Eyal Amir,et al. Psycholinguistic Features for Deceptive Role Detection in Werewolf , 2016, NAACL.
[15] Bo Xie,et al. Public library computer training for older adults to access high-quality Internet health information. , 2009, Library & information science research.
[16] Ben Shneiderman,et al. Designing trust into online experiences , 2000, CACM.
[17] Dorée D. Seligmann,et al. Power dynamics in spoken interactions: a case study on 2012 republican primary debates , 2013, WWW '13 Companion.
[18] James F. Roiger,et al. Testing Interpersonal Deception Theory: The Language of Interpersonal Deception , 1996 .
[19] Noah J. Goldstein,et al. Social influence: compliance and conformity. , 2004, Annual review of psychology.
[20] Kalina Bontcheva,et al. Corpus Annotation through Crowdsourcing: Towards Best Practice Guidelines , 2014, LREC.
[21] James Edwin Mahon,et al. The Definition of Lying and Deception , 2015 .
[22] Jeffrey T. Hancock,et al. Ethical dilemma: Deception dynamics in computer‐mediated group communication , 2017, J. Assoc. Inf. Sci. Technol..
[23] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[24] Dante Alighieri,et al. Dante's Inferno, The Indiana Critical Edition , 1995 .
[25] Chengkai Li,et al. Toward Automated Fact-Checking: Detecting Check-worthy Factual Claims by ClaimBuster , 2017, KDD.
[26] Verónica Pérez-Rosas,et al. Box of Lies: Multimodal Deception Detection in Dialogues , 2019, NAACL.
[27] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[28] Gün R. Semin,et al. Linguistic cues predict fraudulent events in a corporate social network , 2010 .
[29] Claire Cardie,et al. In Search of a Gold Standard in Studies of Deception , 2012 .
[30] Carlos Guestrin,et al. "Why Should I Trust You?": Explaining the Predictions of Any Classifier , 2016, ArXiv.
[31] B. Cornwell,et al. Love on the Internet: involvement and misrepresentation in romantic relationships in cyberspace vs. realspace , 2001, Comput. Hum. Behav..
[32] B. Depaulo,et al. Liking and Lying , 1996 .
[33] J. Pennebaker,et al. Lying Words: Predicting Deception from Linguistic Styles , 2003, Personality & social psychology bulletin.
[34] Jeffrey T. Hancock,et al. What Lies Beneath: The Linguistic Traces of Deception in Online Dating Profiles , 2012 .
[35] Navneet Kaur,et al. Opinion mining and sentiment analysis , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[36] Lyn M. Van Swol,et al. Justifications Offered, Questions Asked, and Linguistic Patterns in Deceptive and Truthful Monetary Interactions , 2016 .
[37] Yada Zhu,et al. Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[38] Neil Shah,et al. False Information on Web and Social Media: A Survey , 2018, ArXiv.
[39] Roberto Navigli,et al. It’s All Fun and Games until Someone Annotates: Video Games with a Purpose for Linguistic Annotation , 2014, TACL.
[40] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[41] Pietro Perona,et al. Visual Recognition with Humans in the Loop , 2010, ECCV.
[42] Nathalie Japkowicz,et al. The class imbalance problem: A systematic study , 2002, Intell. Data Anal..
[43] Joelle Pineau,et al. No Press Diplomacy: Modeling Multi-Agent Gameplay , 2019, NeurIPS.
[44] A. Hadley. Lying , 1908, Encyclopedia of Evolutionary Psychological Science.
[45] Han Liu,et al. "Why is 'Chicago' deceptive?" Towards Building Model-Driven Tutorials for Humans , 2020, CHI.
[46] Isabelle Torrance,et al. Distorted Oaths in Aeschylus , 2015 .
[47] Lorrie Faith Cranor,et al. A Framework for Reasoning About the Human in the Loop , 2008, UPSEC.
[48] V. S. Subrahmanian,et al. An Army of Me: Sockpuppets in Online Discussion Communities , 2017, WWW.
[49] Eric Wallace,et al. Trick Me If You Can: Human-in-the-Loop Generation of Adversarial Examples for Question Answering , 2018, TACL.
[50] Douglas W. Oard,et al. Believe Me - We Can Do This! Annotating Persuasive Acts in Blog Text , 2011, Computational Models of Natural Argument.
[51] Brendan T. O'Connor,et al. Cheap and Fast – But is it Good? Evaluating Non-Expert Annotations for Natural Language Tasks , 2008, EMNLP.
[52] Timothy R. Levine,et al. Accuracy in detecting truths and lies: Documenting the “veracity effect” , 1999 .
[53] Philip Resnik,et al. More than Words: Syntactic Packaging and Implicit Sentiment , 2009, NAACL.
[54] Julia Hirschberg,et al. Linguistic Cues to Deception and Perceived Deception in Interview Dialogues , 2018, NAACL.
[55] Tian Lin,et al. Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing , 2017, CHI.
[56] Jon M. Kleinberg,et al. Echoes of power: language effects and power differences in social interaction , 2011, WWW.
[57] Anne K. Gordon,et al. The enigma of altruistic lying: Perspective differences in what motivates and justifies lie telling within romantic relationships , 2004 .
[58] Mohamed Abouelenien,et al. Verbal and Nonverbal Clues for Real-life Deception Detection , 2015, EMNLP.