Spotting Faked Identities via Mouse Dynamics Using Complex Questions
暂无分享,去创建一个
[1] Galit Nahari,et al. Exploiting liars' verbal strategies by examining the verifiability of details , 2014 .
[2] Gershon Ben-Shakhar,et al. Current Research and Potential Applications of the Concealed Information Test: An Overview , 2012, Front. Psychology.
[3] Li Su,et al. Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough , 2014, PloS one.
[4] Luciano Gamberini,et al. Identity Verification Using a Kinematic Memory Detection Technique , 2017 .
[5] S. Sawilowsky. New Effect Size Rules of Thumb , 2009 .
[6] Luciano Gamberini,et al. How Human-Mouse Interaction can Accurately Detect Faked Responses About Identity , 2016, Symbiotic.
[7] Michael B. Lewis,et al. Telling Lies: The Irrepressible Truth? , 2013, PloS one.
[8] Lyn M. Van Swol,et al. Communicating Deception: Differences in Language Use, Justifications, and Questions for Lies, Omissions, and Truths , 2014 .
[9] Luciano Gamberini,et al. False Identity Detection Using Complex Sentences , 2018, Front. Psychol..
[10] Giuseppe Sartori,et al. The autobiographical IAT: a review , 2013, Front. Psychol..
[11] Eibe Frank,et al. Logistic Model Trees , 2003, ECML.
[12] Giuseppe Sartori,et al. The Detection of Malingering: A New Tool to Identify Made-Up Depression , 2018, Front. Psychiatry.
[13] Matthias Gamer,et al. Influence of countermeasures on the validity of the Concealed Information Test. , 2016, Psychophysiology.
[14] S. Cessie,et al. Ridge Estimators in Logistic Regression , 1992 .
[15] Luciano Gamberini,et al. The detection of faked identity using unexpected questions and mouse dynamics , 2017, PloS one.
[16] Umberto Castiello,et al. Detecting fakers of the autobiographical IAT , 2011 .
[17] S. Sathiya Keerthi,et al. Improvements to Platt's SMO Algorithm for SVM Classifier Design , 2001, Neural Computation.
[18] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[19] Bruno Verschuere,et al. ID‐Check: Online Concealed Information Test Reveals True Identity , 2016, Journal of forensic sciences.
[20] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[21] Jonathan B Freeman,et al. MouseTracker: Software for studying real-time mental processing using a computer mouse-tracking method , 2010, Behavior research methods.
[22] A. Vrij,et al. Outsmarting the Liars: The Benefit of Asking Unanticipated Questions , 2009, Law and human behavior.
[23] Mauro Conti,et al. Covert lie detection using keyboard dynamics , 2018, Scientific Reports.
[24] Mauro Conti,et al. Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics , 2017, ARES.
[25] Fenna H. Poletiek,et al. The Effects of Unexpected Questions on Detecting Familiar and Unfamiliar Lies , 2013 .
[26] Aldert Vrij,et al. Sorting the liars from the truth tellers: the benefits of asking unanticipated questions on lie detection , 2013 .
[27] Aspen H. Yoo,et al. Cognitive-load approaches to detect deception: searching for cognitive mechanisms , 2014, Trends in Cognitive Sciences.
[28] Maria Hartwig,et al. Guilty and innocent suspects’ strategies during police interrogations , 2007 .
[29] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .