Skip to main content

Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15416))

Included in the following conference series:

  • 298 Accesses

Abstract

In online communication it is difficult to know when something written is genuine or deceitful. There exist many reasons for someone to act less-than-truthful online (i.e., monetary gain, political gain) and detecting this behavior without any physical interaction is a difficult task. Additionally, deception occurs in several text-only domains and it is unclear if these various sources can be leveraged to improve detection. To address this, eight datasets were utilized from various domains to evaluate their effect on classifier performance when combined with transfer learning via intermediate layer concatenation of fine-tuned BERT models. We find improvements in accuracy over the baseline. Furthermore, we evaluate multiple distance measurements between datasets and find that Jensen-Shannon distance correlates moderately with transfer learning performance. Finally, the impact was evaluated of multiple methods, which produce additional information in a dataset’s text via named entities, on BERT performance and we find notable improvement in accuracy of up to 11.2%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://huggingface.co/google-bert/bert-base-uncased.

  2. 2.

    https://stanfordnlp.github.io/stanza/.

References

  1. Addawood, A., Badawy, A., Lerman, K., Ferrara, E.: Linguistic cues to deception: identifying political trolls on social media. In: Proceedings of the International AAAI Conference on Web and Social Media, vol. 13, pp. 15–25 (2019)

    Google Scholar 

  2. Almeida, T.A., Hidalgo, J.M.G., Yamakami, A.: Contributions to the study of SMS spam filtering: new collection and results. In: Proceedings of the 11th ACM Symposium on Document Engineering, pp. 259–262 (2011)

    Google Scholar 

  3. Banerjee, R., Feng, S., Kang, J.S., Choi, Y.: Keystroke patterns as prosody in digital writings: a case study with deceptive reviews and essays. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp. 1469–1473 (2014)

    Google Scholar 

  4. Burgoon, J.K., Buller, D.B.: Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics. J. Nonverbal Behav. 18, 155–184 (1994)

    Google Scholar 

  5. Crockett, K., O’Shea, J., Khan, W.: Automated deception detection of males and females from non-verbal facial micro-gestures. In: 2020 International Joint Conference on Neural Networks (IJCNN), pp. 1–7. IEEE (2020)

    Google Scholar 

  6. Dai, W., Yang, Q., Xue, G.R., Yu, Y.: Boosting for transfer learning. In: Proceedings of the 24th ICML, pp. 193–200 (2007)

    Google Scholar 

  7. Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)

  8. Egozi, G., Verma, R.: Phishing email detection using robust NLP techniques. In: 2018 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 7–12. IEEE (2018)

    Google Scholar 

  9. Feng, S., Banerjee, R., Choi, Y.: Syntactic stylometry for deception detection. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pp. 171–175 (2012)

    Google Scholar 

  10. Fornaciari, T., Bianchi, F., Poesio, M., Hovy, D., et al.: Bertective: language models and contextual information for deception detection. In: Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume. Association for Computational Linguistics (2021)

    Google Scholar 

  11. Freund, Y., Schapire, R.E.: A desicion-theoretic generalization of on-line learning and an application to boosting. In: Vitányi, P. (ed.) Computational Learning Theory, pp. 23–37. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  12. Hauch, V., Blandón-Gitlin, I., Masip, J., Sporer, S.L.: Are computers effective lie detectors? A meta-analysis of linguistic cues to deception. Pers. Soc. Psychol. Rev. 19(4), 307–342 (2015)

    Article  Google Scholar 

  13. Jindal, N., Liu, B.: Opinion spam and analysis. In: Proceedings of the 2008 International Conference on Web Search and Data Mining, pp. 219–230 (2008)

    Google Scholar 

  14. Lazer, D.M., et al.: The science of fake news. Science 359(6380), 1094–1096 (2018)

    Article  Google Scholar 

  15. Li, J., Lv, P., Xiao, W., Yang, L., Zhang, P.: Exploring groups of opinion spam using sentiment analysis guided by nominated topics. Expert Syst. Appl. 171, 114585 (2021)

    Article  Google Scholar 

  16. Niu, S., Liu, Y., Wang, J., Song, H.: A decade survey of transfer learning (2010–2020). IEEE Trans. Artif. Intell. 1(2), 151–166 (2020)

    Article  Google Scholar 

  17. Panda, S., Levitan, S.: Deception detection within and across domains: identifying and understanding the performance gap. ACM J. Data Inf. Qual. 15(1), 1–27 (2022)

    Google Scholar 

  18. Shahriar, S., Mukherjee, A., Gnawali, O.: Deception detection with feature-augmentation by soft domain transfer. In: International Conference on Social Informatics, pp. 373–380 (2022)

    Google Scholar 

  19. Shojaee, S., Murad, M.A.A., Azman, A.B., Sharef, N.M., Nadali, S.: Detecting deceptive reviews using lexical and syntactic features. In: 2013 13th International Conference on Intelligent Systems Design and Applications, pp. 53–58. IEEE (2013)

    Google Scholar 

  20. Tang, H., Cao, H.: A review of research on detection of fake commodity reviews. In: Journal of Physics: Conference Series, vol. 1651, p. 012055 (2020)

    Google Scholar 

  21. Triplett, S., Minami, S., Verma, R.M.: Effects of soft-domain transfer and named entity information on deception detection. arXiV preprint (2024)

    Google Scholar 

  22. Upadhayay, B., Behzadan, V.: Sentimental liar: extended corpus and deep learning models for fake claim classification. In: 2020 IEEE ISI Conference, pp. 1–6 (2020)

    Google Scholar 

  23. Wang, B., Mendez, J., Cai, M., Eaton, E.: Transfer learning via minimizing the performance gap between domains. In: NIPS, vol. 32 (2019)

    Google Scholar 

  24. Wang, W.: “Liar, liar pants on fire”: a new benchmark dataset for fake news detection. arXiv preprint arXiv:1705.00648 (2017)

  25. Zeng, V., Liu, X., Verma, R.M.: Does deception leave a content independent stylistic trace? In: Proceedings of ACM CODSAPY, pp. 349–351 (2022)

    Google Scholar 

  26. Zhao, S., Xu, Z., Liu, L., Guo, M., Yun, J.: Towards accurate deceptive opinions detection based on word order-preserving CNN. Math. Probl. Eng. 2018 (2018)

    Google Scholar 

  27. Zubiaga, A., Liakata, M., Procter, R.: Learning reporting dynamics during breaking news for rumour detection in social media. arXiv preprint arXiv:1610.07363 (2016)

Download references

Acknowledgement

Research partly supported by NSF grants 2210198 and 2244279, ARO grants W911NF-20-1-0254 and W911NF-23-1-0191, and a USDOT Cyber transportation center grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Steven Triplett .

Editor information

Editors and Affiliations

Ethics declarations

Disclosure of Interests

Verma is the founder of Everest Cyber Security and Analytics, Inc.

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Triplett, S., Minami, S., Verma, R.M. (2025). Effects of Soft-Domain Transfer and Named Entity Information on Deception Detection. In: Patil, V.T., Krishnan, R., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2024. Lecture Notes in Computer Science, vol 15416. Springer, Cham. https://doi.org/10.1007/978-3-031-80020-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-80020-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-80019-1

  • Online ISBN: 978-3-031-80020-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics