Papers
Topics
Authors
Recent
Search
2000 character limit reached

Deception Detection from Linguistic and Physiological Data Streams Using Bimodal Convolutional Neural Networks

Published 18 Nov 2023 in cs.CL, cs.AI, and cs.LG | (2311.10944v5)

Abstract: Deception detection is gaining increasing interest due to ethical and security concerns. This paper explores the application of convolutional neural networks for the purpose of multimodal deception detection. We use a dataset built by interviewing 104 subjects about two topics, with one truthful and one falsified response from each subject about each topic. In particular, we make three main contributions. First, we extract linguistic and physiological features from this data to train and construct the neural network models. Second, we propose a fused convolutional neural network model using both modalities in order to achieve an improved overall performance. Third, we compare our new approach with earlier methods designed for multimodal deception detection. We find that our system outperforms regular classification methods; our results indicate the feasibility of using neural networks for deception detection even in the presence of limited amounts of data.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (40)
  1. B. M. DePaulo, J. J. Lindsay, B. E. Malone, L. Muhlenbruck, K. Charlton, and H. Cooper, “Cues to deception,” Psychological Bulletin, vol. 129, no. 1, pp. 74–118, 2003.
  2. M. Ott, Y. Choi, C. Cardie, and J. T. Hancock, “Finding deceptive opinion spam by any stretch of the imagination,” in Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, Stroudsburg, PA, USA, 2011, pp. 309–319.
  3. C. F. Bond and B. M. DePaulo, “Accuracy of deception judgments,” Personality and Social Psychology Review, vol. 10, no. 3, pp. 214–234, 2006.
  4. M. Abouelenien, V. Pérez-Rosas, R. Mihalcea, and M. Burzo, “Deception detection using a multimodal approach,” in Proceedings of the 16th International Conference on Multimodal Interaction, 2014, pp. 58–65.
  5. ——, “Detecting deceptive behavior via integration of discriminative features from multiple modalities,” IEEE Transactions on Information Forensics and Security, vol. 12, pp. 1042–1055, 2017.
  6. H. Liu, Y. Shen, W. Zhou, Y. Zou, C. Zhou, and S. He, “Adaptive speed planning for unmanned vehicle based on deep reinforcement learning,” arXiv preprint arXiv:2404.17379, 2024.
  7. Y. Shen, H. Liu, X. Liu, W. Zhou, C. Zhou, and Y. Chen, “Localization through particle filter powered neural network estimated monocular camera poses,” arXiv preprint arXiv:2404.17685, 2024.
  8. X. Yan, W. Wang, M. Xiao, Y. Li, and M. Gao, “Survival prediction across diverse cancer types using neural networks,” arXiv preprint arXiv:2404.08713, 2024.
  9. M. Xiao, Y. Li, X. Yan, M. Gao, and W. Wang, “Convolutional neural network classification of cancer cytopathology images: taking breast cancer as an example,” arXiv preprint arXiv:2404.08279, 2024.
  10. Y. Ge, Z. Xu, Y. Xiao, G. Xin, Y. Pang, and L. Itti, “Encouraging disentangled and convex representation with controllable interpolation regularization,” in Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023, pp. 4761–4769.
  11. J. Yao, T. Wu, and X. Zhang, “Improving depth gradientcontinuity in transformers: A comparative study on monocular depth estimation with cnn,” arXiv preprint arXiv:2308.08333, 2023.
  12. Y. Gong, H. Zhang, R. Xu, Z. Yu, and J. Zhang, “Innovative deep learning methods for precancerous lesion detection,” International Journal of Innovative Research in Computer Science & Technology, vol. 12, no. 2, pp. 81–86, 2024.
  13. N. Quach, Q. Wang, Z. Gao, Q. Sun, B. Guan, and L. Floyd, “Reinforcement learning approach for integrating compressed contexts into knowledge graphs,” arXiv preprint arXiv:2404.12587, 2024.
  14. Z. Li, B. Wan, C. Mu, R. Zhao, S. Qiu, and C. Yan, “Ad-aligning: Emulating human-like generalization for cognitive domain adaptation in deep learning,” arXiv preprint arXiv:2405.09582, 2024.
  15. Y. Li, X. Yan, M. Xiao, W. Wang, and F. Zhang, “Investigation of creating accessibility linked data based on publicly available accessibility datasets,” in Proceedings of the 2023 13th International Conference on Communication and Network Security, ser. ICCNS ’23.   New York, NY, USA: Association for Computing Machinery, 2024, p. 77–81.
  16. Z. Li, P. Zhou, Y. Zhang, and L. Gao, “Joint coverage and power control in highly dynamic and massive uav networks: An aggregative game-theoretic learning approach,” arXiv preprint arXiv:1907.08363, 2019.
  17. P. Li, Y. Lin, and E. Schultz-Fellenz, “Contextual hourglass network for semantic segmentation of high resolution aerial imagery,” CoRR, 2019. [Online]. Available: http://arxiv.org/abs/1810.12813
  18. X. Chen, A. T. Z. Kasgari, and W. Saad, “Deep learning for content-based personalized viewport prediction of 360-degree vr videos,” IEEE Networking Letters, vol. 2, no. 2, pp. 81–84, 2020.
  19. A. Shree, K. Jia, Z. Xiong, S. F. Chow, R. Phan, P. Li, and D. Curro, “Image analysis,” US Patent App. 17/638,773, 2022.
  20. W. Castillo, B. Scott, A. Firl, D. R. Cutts, J. M. Igner, D. Rethage, D. Curro, and P. Li, “Techniques for enhanced image capture using a computer-vision network,” US Patent App. 17/163,043, 2021.
  21. W. Dai, J. Tao, X. Yan, Z. Feng, and J. Chen, “Addressing unintended bias in toxicity detection: An lstm and attention-based approach,” in 2023 5th International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2023, pp. 375–379.
  22. Z. Zeng, D. Wang, F. Yang, H. Park, Y. Wu, S. Soatto, B.-W. Hong, D. Lao, and A. Wong, “Wordepth: Variational language prior for monocular depth estimation,” arXiv preprint arXiv:2404.03635, 2024.
  23. R. Zhang, Z. Zeng, Z. Guo, and Y. Li, “Can language understand depth?” in Proceedings of the 30th ACM International Conference on Multimedia, 2022, pp. 6868–6874.
  24. R. Zhang, Z. Zeng, Z. Guo, X. Gao, K. Fu, and J. Shi, “Dspoint: Dual-scale point cloud recognition with high-frequency fusion,” arXiv preprint arXiv:2111.10332, 2021.
  25. L. Ma and M. Li, “A quantitative way to utilise the social network in social status: A study using cbdb song dynasty data,” in 10th International Conference of Digital Archives and Digital Humanities, 2019.
  26. Y. Tian, H. Zhang, Y. Jiang, P. Li, and Y. Li, “A fusion feature for enhancing the performance of classification in working memory load with single-trial detection,” IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 27, no. 10, pp. 1985–1993, 2019.
  27. M. Liu, H. Zhang, J. Song, and M. Lu, “Using generative model for intelligent design of dielectric resonator antennas,” Microwave and Optical Technology Letters, vol. 66, no. 1, p. e34013, 2024.
  28. A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in Neural Information Processing Systems 25, 2012, pp. 1097–1105.
  29. J. Yuan, L. Wu, Y. Gong, Z. Yu, Z. Liu, and S. He, “Research on intelligent aided diagnosis system of medical image based on computer deep learning,” arXiv preprint arXiv:2404.18419, 2024.
  30. J. Wang, X. Li, Y. Jin, Y. Zhong, K. Zhang, and C. Zhou, “Research on image recognition technology based on multimodal deep learning,” arXiv preprint arXiv:2405.03091, 2024.
  31. Y. Kim, “Convolutional neural networks for sentence classification,” in Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, EMNLP, 2014, pp. 1746–1751.
  32. C. Sun, Q. Du, and G. Tian, “Exploiting product related review features for fake review detection,” Mathematical Problems in Engineering, 2016.
  33. G. Ganis, J. P. Rosenfeld, J. Meixner, R. A. Kievit, and H. E. Schendan, “Lying in the scanner: Covert countermeasures disrupt deception detection by functional magnetic resonance imaging,” NeuroImage, vol. 55, no. 1, pp. 312–319, 2011.
  34. J. Hirschberg, S. Benus, J. M. Brenier, F. Enos, S. Friedman, S. Gilman, C. Girand, M. Graciarena, A. Kathol, L. Michaelis et al., “Distinguishing deceptive from non-deceptive speech,” in Ninth European Conference on Speech Communication and Technology, 2005.
  35. B. A. Rajoub and R. Zwiggelaar, “Thermal facial analysis for deception detection,” Trans. Info. For. Sec., vol. 9, no. 6, pp. 1015–1023, Jun. 2014.
  36. T. Baltrusaitis, C. Ahuja, and L. Morency, “Multimodal machine learning: A survey and taxonomy,” CoRR, vol. abs/1705.09406, 2017.
  37. L. Zhou, J. K. Burgoon, D. P. Twitchell, T. Qin, and J. F. Nunamaker, Jr., “A comparison of classification methods for predicting deception in computer-mediated communication,” Journal of Management Information Systems, vol. 20, no. 4, pp. 139–166, 2004.
  38. T. Wu, S. Liu, J. Zhang, and Y. Xiang, “Twitter spam detection based on deep learning,” in Proceedings of the Australasian Computer Science Week Multiconference.   New York, NY, USA: ACM, 2017, pp. 3:1–3:8.
  39. W. Y. Wang, “”liar, liar pants on fire”: A new benchmark dataset for fake news detection,” in Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, ACL 2017, Vancouver, Canada, July 30 - August 4, Volume 2: Short Papers, 2017, pp. 422–426.
  40. T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of word representations in vector space,” arXiv preprint arXiv:1301.3781, 2013.
Citations (62)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.