{"id":"https://openalex.org/W2950454756","doi":"https://doi.org/10.1109/iww-bci.2019.8737320","title":"P300-based deception detection of mock network fraud with modified genetic algorithm and combined classification","display_name":"P300-based deception detection of mock network fraud with modified genetic algorithm and combined classification","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2950454756","doi":"https://doi.org/10.1109/iww-bci.2019.8737320","mag":"2950454756"},"language":"en","primary_location":{"id":"doi:10.1109/iww-bci.2019.8737320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iww-bci.2019.8737320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 7th International Winter Conference on Brain-Computer Interface (BCI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101893362","display_name":"Xiaochen Liu","orcid":"https://orcid.org/0000-0001-6342-7704"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaochen Liu","raw_affiliation_strings":["College of Information Science & Electronic Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science & Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043025337","display_name":"Jizhong Shen","orcid":"https://orcid.org/0000-0002-9031-2379"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jizhong Shen","raw_affiliation_strings":["College of Information Science & Electronic Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science & Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032928397","display_name":"Zhao Wu-feng","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wufeng Zhao","raw_affiliation_strings":["College of Information Science & Electronic Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science & Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101893362"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07174238,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9745000004768372,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.7202193737030029},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.693041205406189},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6542273163795471},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5809216499328613},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5703086853027344},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.5354504585266113},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5304526686668396},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.4650982618331909},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.4516512453556061},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.356812983751297}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.7202193737030029},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.693041205406189},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6542273163795471},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5809216499328613},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5703086853027344},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.5354504585266113},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5304526686668396},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.4650982618331909},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.4516512453556061},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.356812983751297},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iww-bci.2019.8737320","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iww-bci.2019.8737320","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 7th International Winter Conference on Brain-Computer Interface (BCI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8399999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W147679392","https://openalex.org/W1602346470","https://openalex.org/W1977968613","https://openalex.org/W2048939323","https://openalex.org/W2062674152","https://openalex.org/W2073245587","https://openalex.org/W2094353333","https://openalex.org/W2140316171","https://openalex.org/W2145947508","https://openalex.org/W2294045431","https://openalex.org/W2408629637","https://openalex.org/W2464315941","https://openalex.org/W2602008542","https://openalex.org/W6606048559","https://openalex.org/W6735393646"],"related_works":["https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W4295295666","https://openalex.org/W1978059949","https://openalex.org/W2512387791","https://openalex.org/W70044515","https://openalex.org/W2128448209"],"abstract_inverted_index":{"To":[0],"detect":[1,140],"network":[2,37,143],"fraud,":[3],"a":[4,10,24,29,49],"three-stimulus":[5],"paradigm":[6],"was":[7,33,57,72,89],"used":[8],"in":[9],"mock":[11,36],"crime":[12],"P300-based":[13,18],"concealed":[14],"information":[15],"test.":[16],"A":[17,82],"deception":[19,141],"detection":[20],"method":[21,136],"based":[22,53,85],"on":[23,86],"modified":[25,50],"genetic":[26,55],"algorithm":[27,56],"and":[28,46,98,110],"confidence-coefficient-based":[30],"combined":[31,83,103],"classifier":[32,84,104],"created":[34],"for":[35,59,91,123],"fraud":[38,144],"detection.":[39],"After":[40],"the":[41,69,76,95,102,111,134],"multi-domain":[42],"integrated":[43],"signal":[44],"preprocessing":[45],"feature":[47,60,66],"extraction,":[48],"logistic":[51],"equation":[52],"multi-population":[54],"adopted":[58],"selection":[61],"to":[62,74,118,139],"obtain":[63],"an":[64],"optimal":[65],"subset.":[67],"Then":[68],"confidence":[70,87],"coefficient":[71,88],"proposed":[73,90,135],"determine":[75],"classification":[77,113],"difficulty":[78],"levels":[79],"of":[80],"samples.":[81],"classification.":[92],"Compared":[93],"with":[94],"component":[96],"classifiers":[97],"other":[99],"individual":[100],"classifiers,":[101],"requires":[105],"34%":[106],"less":[107],"computing":[108],"time":[109],"mean":[112],"accuracy":[114],"rate":[115],"is":[116,137],"0.2":[117],"2.23":[119],"percentage":[120],"points":[121],"higher":[122],"twelve":[124],"subjects":[125],"using":[126],"leave-one-out":[127],"cross":[128],"validation.":[129],"Experiment":[130],"results":[131],"confirm":[132],"that":[133],"effective":[138],"during":[142],"simulation.":[145]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
