See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
S. AgostaV. GhirardiC. ZogmaisterU. CastielloG. Sartori 2010 Detecting fakers of the autobiographical IAT Applied Cognitive Psychology 25 2 299 306
S. AgostaG. Sartori 2013 The autobiographical IAT: a review Frontiers in psychology 4 519
A. BaddeleyM.W. EysenckM.C. Anderson 2014 Memory Psychology Press
G. Ben-Shakhar 2012 Current Research and Potential Applications of the Concealed Information Test: An Overview Frontiers in Psychology 3 342
I. Blandón-GitlinE. FennJ. MasipA.H. Yoo 2014 Cognitive-load approaches to detect deception: Searching for cognitive mechanisms Trends in Cognitive Sciences 18 9 441 444
H. BowmanM. FilettiA. AlsufyaniD. JanssenL. Su 2014 Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough PLoS ONE 9 3 e90595
L. Breiman 2001 Random forest Machine Learning 45 1 5 32
S. le CessieJ.C. van Houwelingen 1992 Ridge estimators in logistic regression Applied Statistics 41 1 191 201
Crossing borders: how terrorists use fake passports, visas, and other identity documents 2014 Frontline http://www.pbs.org/wgbh/pages/frontline/shows/trail/etc/fake.html
J.B. FreemanN. Ambady 2010 MouseTracker: software for studying real-time mouse-tracking method Behavior Research Methods 42 1 226 241
H.R.158 - Visa Waiver Program improvement and Terrorist Travel Prevention Act of 2015 2015 Congress.Gov http://www.congress.gov/bill/114th-congress/house-bill/158/text
M.A. Hall 1999 Correlation-based Feature Selection for Machine Learning
M.A. HallE. FrankG. HolmesB. PfahringerP. ReutemannI.H. Witten 2009 The WEKA data mining software: an update ACM SIGKDD Explorations Newsletter 11 1 10 18
M. HartwigP.A. GranhagL. Strçmwall 2007 Guilty and innocent suspects‟ strategies during interrogations Psychology, Crime & Law& Law 13 213 227
J.G. Hickey 2015 Report: 25 percent jump in illegals stopped at border for fake IDs Newsmax http://www.newsmax.com/Newsfront/illegals-border-fake-id/2015/01/08/id/617256/
S.S. KeerthiS.K. ShevadeC. BhattacharyyaK.R.K. Murthy 2001 Improvements to platt‟s SMO algorithm for SVM classifier design Neural Computation 13 3 637 649
G.L.J. LancasterA. VrijL. HopeB. Waller 2013 Sorting the Liars from the Truth Tellers: The Benefits of Asking Unanticipated Questions on Lie Detection Applied Cognitive Psychology 27 107 114
N. LandwehrM. HallE. Frank 2005 Logistic model trees Machine Learning 95 1-2 161 205
M. MonaroF.I. FugazzaL. GamberiniG. Sartori 2017a How Human-Mouse Interaction can Accurately Detect Faked Responses About Identity L. GamberiniA. SpagnolliG. JacucciB. BlankertzJ. Freeman, eds. Symbiotic Interaction. Symbiotic 2016. Lecture Notes in Computer Science, vol 9961 Springer, Cham 115 124
M. MonaroC. GalanteR. Spolaor 2018a Covert lie detection using keyboard dynamics Scientific Reports 8 1976
M. MonaroL. GamberiniG. Sartori 2017b Identity Verification Using a Kinematic Memory Detection Technique K. HaleK. Stanney, eds. Advances in Neuroergonomics and Cognitive Engineering. Advances in Intelligent Systems and Computing, vol 488 Springer, Cham 123 132
M. MonaroL. GamberiniG. Sartori 2017c The detection of faked identity using unexpected questions and mouse dynamics PLOS ONE 12 5 e0177851
M. MonaroL. GamberiniF. ZecchinatoG. Sartori 2018b False Identity Detection Using Complex Sentences Frontiers in Psychology 9 283
M. MonaroR. SpolaorL. QianQianM. ContiL. GamberiniG. Sartori 2017d Type me the truth!: Detecting deceitful users via keystroke dynamics Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES ’17
M. MonaroA. TonciniS. Ferracuti 2018c The detection of malingering: a new tool to identify made up depression Frontiers in Psychiatry
G. NahariA. VrijR.P. Fisher 2014 Exploiting liars‟ verbal strategies by examining the verifiability of details Legal and Criminological Psychology 19 2 227 239
D. Navarro 2015 Learning statistics with R: a tutorial for psychology students and other beginners. University of Adelaide, Adelaide
J. PethK. SuchotzkiG. Matthias 2016 Influence of countermeasures on the validity of the Concealed Information Test Psychophysiology 53 9 1429 1440
S. Sawilowsky 2009 New effect size rules of thumb Journal of Modern Applied Statistical Methods 8 2 467 474
L.M. SwolM.T. Braun 2014 Communicating deception: differences in language use, justifications, and questions for lies, omissions, and truths Group Decision and Negotiation 23 6 1343 1367
B. VerschuereB. Kleinberg 2016 ID-Check: Online Concealed Information Test Reveals True Identity Journal of Forensic Sciences 61 Suppl 1 S237-40
A. VrijS. LealP.A. Granhag 2009 Outsmarting the liars: The benefit of asking unanticipated questions Law and Human Behavior 33 2 159 166
L. WarmelinkA. VrijS. MannS. LealF.H. Poletiek 2013 The effects of unexpected questions on detecting familiar and unfamiliar lies Psychiatry, Psychology and Law 20 1 29 35
E.J. WilliamsL.A. BottJ. PatrickM.B. Lewis 2013 Telling Lies: The Irrepressible Truth? PLoS ONE 8 4 e60713