Abstract
In online communication it is difficult to know when something written is genuine or deceitful. There exist many reasons for someone to act less-than-truthful online (i.e., monetary gain, political gain) and detecting this behavior without any physical interaction is a difficult task. Additionally, deception occurs in several text-only domains and it is unclear if these various sources can be leveraged to improve detection. To address this, eight datasets were utilized from various domains to evaluate their effect on classifier performance when combined with transfer learning via intermediate layer concatenation of fine-tuned BERT models. We find improvements in accuracy over the baseline. Furthermore, we evaluate multiple distance measurements between datasets and find that Jensen-Shannon distance correlates moderately with transfer learning performance. Finally, the impact was evaluated of multiple methods, which produce additional information in a dataset’s text via named entities, on BERT performance and we find notable improvement in accuracy of up to 11.2%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Addawood, A., Badawy, A., Lerman, K., Ferrara, E.: Linguistic cues to deception: identifying political trolls on social media. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 13, pp. 15–25 (2019)
Almeida, T.A., Hidalgo, J.M.G., Yamakami, A.: Contributions to the study of SMS spam filtering: new collection and results. In: Proceedings of the 11th ACM Symposium on Document Engineering, pp. 259–262 (2011)
Banerjee, R., Feng, S., Kang, J.S., Choi, Y.: Keystroke patterns as prosody in digital writings: a case study with deceptive reviews and essays. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1469–1473 (2014)
Burgoon, J.K., Buller, D.B.: Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. J. Nonverbal Behav. 18, 155–184 (1994)
Crockett, K., O’Shea, J., Khan, W.: Automated deception detection of males and females from non-verbal facial micro-gestures. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1–7. IEEE (2020)
Dai, W., Yang, Q., Xue, G.R., Yu, Y.: Boosting for transfer learning. In: Proceedings of the 24th ICML, pp. 193–200 (2007)
Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)
Egozi, G., Verma, R.: Phishing email detection using robust NLP techniques. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 7–12. IEEE (2018)
Feng, S., Banerjee, R., Choi, Y.: Syntactic stylometry for deception detection. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pp. 171–175 (2012)
Fornaciari, T., Bianchi, F., Poesio, M., Hovy, D., et al.: Bertective: language models and contextual information for deception detection. In: Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume. Association for Computational Linguistics (2021)
Freund, Y., Schapire, R.E.: A desicion-theoretic generalization of on-line learning and an application to boosting. In: Vitányi, P. (ed.) Computational Learning Theory, pp. 23–37. Springer, Heidelberg (1995)
Hauch, V., Blandón-Gitlin, I., Masip, J., Sporer, S.L.: Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Pers. Soc. Psychol. Rev. 19(4), 307–342 (2015)
Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219–230 (2008)
Lazer, D.M., et al.: The science of fake news. Science 359(6380), 1094–1096 (2018)
Li, J., Lv, P., Xiao, W., Yang, L., Zhang, P.: Exploring groups of opinion spam using sentiment analysis guided by nominated topics. Expert Syst. Appl. 171, 114585 (2021)
Niu, S., Liu, Y., Wang, J., Song, H.: A decade survey of transfer learning (2010–2020). IEEE Trans. Artif. Intell. 1(2), 151–166 (2020)
Panda, S., Levitan, S.: Deception detection within and across domains: identifying and understanding the performance gap. ACM J. Data Inf. Qual. 15(1), 1–27 (2022)
Shahriar, S., Mukherjee, A., Gnawali, O.: Deception detection with feature-augmentation by soft domain transfer. In: International Conference on Social Informatics, pp. 373–380 (2022)
Shojaee, S., Murad, M.A.A., Azman, A.B., Sharef, N.M., Nadali, S.: Detecting deceptive reviews using lexical and syntactic features. In: 2013 13th International Conference on Intelligent Systems Design and Applications, pp. 53–58. IEEE (2013)
Tang, H., Cao, H.: A review of research on detection of fake commodity reviews. In: Journal of Physics: Conference Series, vol. 1651, p. 012055 (2020)
Triplett, S., Minami, S., Verma, R.M.: Effects of soft-domain transfer and named entity information on deception detection. arXiV preprint (2024)
Upadhayay, B., Behzadan, V.: Sentimental liar: extended corpus and deep learning models for fake claim classification. In: 2020 IEEE ISI Conference, pp. 1–6 (2020)
Wang, B., Mendez, J., Cai, M., Eaton, E.: Transfer learning via minimizing the performance gap between domains. In: NIPS, vol. 32 (2019)
Wang, W.: “Liar, liar pants on fire”: a new benchmark dataset for fake news detection. arXiv preprint arXiv:1705.00648 (2017)
Zeng, V., Liu, X., Verma, R.M.: Does deception leave a content independent stylistic trace? In: Proceedings of ACM CODSAPY, pp. 349–351 (2022)
Zhao, S., Xu, Z., Liu, L., Guo, M., Yun, J.: Towards accurate deceptive opinions detection based on word order-preserving CNN. Math. Probl. Eng. 2018 (2018)
Zubiaga, A., Liakata, M., Procter, R.: Learning reporting dynamics during breaking news for rumour detection in social media. arXiv preprint arXiv:1610.07363 (2016)
Acknowledgement
Research partly supported by NSF grants 2210198 and 2244279, ARO grants W911NF-20-1-0254 and W911NF-23-1-0191, and a USDOT Cyber transportation center grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Disclosure of Interests
Verma is the founder of Everest Cyber Security and Analytics, Inc.
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Triplett, S., Minami, S., Verma, R.M. (2025). Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. In: Patil, V.T., Krishnan, R., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2024. Lecture Notes in Computer Science, vol 15416. Springer, Cham. https://doi.org/10.1007/978-3-031-80020-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-80020-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-80019-1
Online ISBN: 978-3-031-80020-7
eBook Packages: Computer ScienceComputer Science (R0)