首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 250 毫秒
1.
针对汉语篇章分析的三个任务: 篇章单元切割、篇章结构生成和篇章关系识别,该文提出引入框架语义进行分析研究。首先基于框架构建了汉语篇章连贯性描述体系以及相应语料库;然后抽取句首、依存句法、短语结构、目标词、框架等特征,分别训练基于最大熵的篇章单元间有无关系分类器和篇章关系分类器;最后采用贪婪算法自下向上生成篇章结构树。实验证明,框架语义可以有效切割篇章单元,并且框架特征可以有效提升篇章结构以及篇章关系的识别效果。  相似文献   

2.
The current work intended to enhance our knowledge of changes or lack of changes in the speech signal when people were being deceptive. In particular, the study attempted to investigate the appropriateness of using speech cues in detecting deception. Truthful, deceptive and control speech were elicited from ten speakers in an interview setting. The data were subjected to acoustic analysis and results are presented on a range of speech parameters including fundamental frequency (f0), overall amplitude and mean vowel formants F1, F2 and F3. A significant correlation could not be established between deceptiveness/truthfulness and any of the acoustic features examined. Directions for future work are highlighted.  相似文献   

3.
In today’s business environment, deception is commonplace ( and ). Historically, individuals were limited in their media options, however recent technological advances have given individuals more ways in which to communicate and deceive. The use of these new media change the communication dynamic substantially. Previous studies have found that deception detection differs across media, as media vary in their ability to transmit cues, convey emotion and reversibility, among others. Researchers are beginning to understand the dynamics between media characteristics, individual characteristics and media choice in a deceptive communication context.  相似文献   

4.
Online deception is fuelled by the escalated penetration of the Internet and social media. As the threat of online deception increases, understanding deception behaviour and underlying strategies is having a greater social impact. The verbal behaviour of online deception has recently been extended to the discourse level; nevertheless, discourse behaviours have been examined in isolation without referring to other behaviours in the discourse. By conceptualising the discourse of online behaviour as a social network (DOBNet), this research investigates possible impacts of deception intent on the central structures of DOBNet at three different levels: the discourse behaviour, subnetwork, and whole network. The empirical results of discourse network analysis and statistical tests provide partial support for each of the hypothesised effects. The findings not only demonstrate the efficacy of discourse in distinguishing deceivers from truth-tellers but also extend deception theories by confirming deception strategies from the perspective of discourse network and by uncovering unique characteristics of online deception strategies.  相似文献   

5.
Deception research has been primarily studied from a Western perspective, so very little is known regarding how other cultures view deception. Cross-cultural deception research is important due to the escalation of cross-cultural communication. Therefore, this study proposes a framework for understanding the role Korean and American culture plays in deceptive behavior for both face-to-face (FTF) and computer-mediated communication (CMC). The goal of this paper is to test theoretical explanations about the role of culture in deception by the development of a set of hypotheses predicting the conditions under which deception is likely to emerge. A research strategy and construct measures to test the hypotheses are presented. Results from online questionnaires indicated Korean respondents exhibited greater collectivist values, lower levels of power distance, and higher levels of masculine values than Americans. Furthermore, deceptive behavior was greater for FTF communication than for CMC for both Korean and American respondents. In addition to a significant relationship between culture and deception, differences were found between espoused cultural values and deceptive behavior, regardless of national culture. These results indicate the need for future research to consider cultural differences when examining deceptive behavior.  相似文献   

6.
An evolutionary approach to deception in multi-agent systems   总被引:1,自引:0,他引:1  
Understanding issues of trust and deception are key to designing robust, reliable multi-agent systems. This paper builds on previous work which examined the use of auctions as a model for exploring the concept of deception in such systems. We have previously described two forms of deceptive behaviour which can occur in a simulated repeated English auction. The first of these types of deception involves sniping or late bidding, which not only allows an agent to conceal its true valuation for an item, but also potentially allows it to win an item for which it may not possess the highest valuation. The second deceptive strategy involves the placing of false bids which are designed to reduce an opponent’s potential profit. In this work we examine the potential shortcomings of those two strategies and investigate whether or not their individual strengths can be combined to produce a successful hybrid deceptive strategy.  相似文献   

7.
基于欺骗的网络主动防御技术研究   总被引:2,自引:0,他引:2  
在蜜罐中综合运用各种欺骗技术能达到主动保护网络的目的。准确定义了在网络防御中欺骗的概念,分析了各种欺骗的目的和用途,以及分类和发展过程,并详细阐明了运用在蜜罐上的各种欺骗技术原理,包括指纹信息模拟、随机服务器、重定向、牢笼和虚拟命令等。最后讨论了如何根据不同的欺骗目的综合选择合适的欺骗技术进行欺骗部署。  相似文献   

8.
This study explored the effects of avatars on deception – how perceived avatar likeness to self can affect the truthfulness and accuracy of interactions online. More specifically, this study examined the extent to which perceived avatar similarity influences self-awareness and users’ degree of attraction to them, and how these psychological states affect deception in the context of Second Life. The results, based on web-based survey data of 159 Second Life users, revealed that avatar similarity in attitude and behavior to the owner heightened self-awareness, which, in turn, reduced deception. Perceived avatar similarity in terms of appearance was found to have a direct negative impact on deception so that those who perceived their avatars to look similar to themselves were less likely to engage in deceptive behavior. Implications of the findings are discussed.  相似文献   

9.
Modeling deception in a real-world conflict situation is usually difficult. For a better understanding, we study deception through a fundamental relationship between information and decision-making. Under a probabilistic framework, we consider a zero-sum game with an asymmetrical structure, where player 1 receives additional information and player 2 has the potential to inject deception. We derive accuracy conditions on the information obtained by player 1, which can lead to a better decision. The feasibility of deception is further explored, which is conditioned on the quality of deceptive signals generated by player 2. We classify deception into passive and active deception.  相似文献   

10.
The amount of deception taking place via electronic text-based communication is increasing. Research has sought to automatically detect deception by analyzing the text from the communicator. However, the deceptive intent of the communication partner is being ignored. We compare the text from subjects who are trying to deceive each other, subjects trying to deceive truth tellers, subjects telling the truth to truth tellers, and subjects telling the truth to deceivers. We hypothesize that despite the intent of the partner, deceitful text will cluster closest to deceitful text. We cluster each of the four conditions using the text content. The cluster algorithm placed subjects trying to deceive each other closest to subjects telling the truth to each other. In this analysis, the language that led subjects to choose the same outcomes had a stronger effect than the language tied to being deceitful or truthful.  相似文献   

11.
A study was conducted to investigate the body movements of participants waiting to be interviewed in one of two conditions: preparing to answer questions truthfully or preparing to lie. The effects of increased self-awareness were also investigated, with half of the participants facing a mirror; the other half facing a blank wall. Analysis of covertly obtained video footage showed a significant interaction for the duration of hand/arm movements between deception level and self-awareness. Without a mirror, participants expecting to lie spent less time moving their hands than those expecting to tell the truth; the opposite was seen in the presence of a mirror. Participants expecting to lie also had higher levels of anxiety and thought that they were left waiting for less time than those expecting to tell the truth. These findings led to the identification of further research areas with the potential to support deception detection in security applications.  相似文献   

12.
Every day, hundreds of thousands of people pass through airport security checkpoints, border crossing stations, or other security screening measures. Security professionals must sift through countless interactions and ferret out high-risk individuals who represent a danger to other citizens. During each interaction, the security professional must decide whether the individual is being forthright or deceptive. This task is difficult because of the limits of human vigilance and perception and the small percentage of individuals who actually harbor hostile intent. Our research initiative is based on a behavioral approach to deception detection. We attempted to build an automated system that can infer deception or truthfulness from a set of features extracted from head and hands movements in a video. A validated and reliable behaviorally based deception analysis system could potentially have great impacts in augmenting humans' abilities to assess credibility. An automated, unobtrusive system identifies behavioral patterns that indicate deception from nonverbal behavioral cues and classifies deception and truth more accurately than many humans.  相似文献   

13.
基于Apache的低交互蜜罐设计与实现   总被引:1,自引:0,他引:1  
吴馨  黄皓 《计算机科学》2006,33(4):97-102
蜜罐是一种新型的网络防御工具,其伪装的逼真程度和欺骗的成功率一直是设计的难点。很多蜜罐通过脚本来模拟网络服务,使用静态欺骗来保护网络,很容易暴露。本文设计并实现了一种基于Apache的低交互蜜罐——Honeyweb,具有http协议检测、动态欺骗、与其他网络安全设备联动以及日志等功能,能根据不同的http请求作出动态欺骗响应。实验表明,部署它能在很大程度上影响黑客的判断力,消耗攻击资源,甚至阻止攻击.从而实现主动防御、保护Web服务器免受攻击的目的。  相似文献   

14.
本文介绍了基于诱骗技术的网络入侵检测系统(IDS),它是传统入侵检测系统的延伸。描述了入侵诱骗系统的定义及体系结构,系统地分析了基于入侵诱骗的网络安全系统及实现技术。  相似文献   

15.
入侵诱骗模型的研究与建立   总被引:33,自引:5,他引:33  
分析了侵诱骗的实现方式,形式地定义了入侵诱骗系统,提出了入侵诱骗的体系结构,引入了入侵行为重定的概念,将入侵检测和入侵诱骗有机地结合起来,弥补了“HoneyPot”的守株待兔的不足,对入侵诱骗系统做出了总体设计,并给出了一个入侵诱骗系统的实现模型。  相似文献   

16.
In this study the robotic deception phenomenon is raised in the framework of a signaling game which utilizes fuzzy logic and game theory along with inspirations from nature. Accomplishing the fuzzy signaling strategy set for deceptive players serves as a great part of our contribution and on this aim, hierarchical fuzzy inference systems support receiver’s actions and sender’s ant-inspired deceptive signals (track and pheromone). In addition, special deceptive robots and visually-supported experimental environment are also provided. The fuzzy behavior of robots defines the strategy type of players. The final result of deception process depends on this strategy type which leads to proposing a payoff matrix in which each cell of mutual costs is defined with special supporting logic related to our deception game with pursuit–evasion applications. Furthermore, motivated by animal signaling, through applying mixed strategies on deceiver’s honesty level and rival’s trust level, the corresponding learning dynamics are investigated and the conceptual discussion put forward serves as a proof to the smart human-like behavior that occurs between the robots: the interactive learning. Simulation results show that robots are capable of interactive learning within deceptive interaction and finally change their strategies to adopt themselves to new situation occurred due to opponent’s strategy change. Because of repetitive change in strategies as a result of learning, the conditions of a persistent deception without breakdown holds for this game where deceiver can frequently benefit from deception without leaving rival to lose its trust totally. The change in strategy will happen after a short time needed to learn the new situation. In rival’s learning process, this short time, which we call the ignorance time, exactly is the period that deceiver can benefit from deception while its evil intends are still concealed. Moreover, in this study an algorithm is given for the proposed signaling game of deception and an illustrative experiment in the introduced experimental environment demonstrates the process of a successful deception. The paper also gives solution to the proposed game by analyzing mixed Nash equilibrium which turns out to be the interior center fixed point of the learning dynamics.  相似文献   

17.
With the recent and dramatic changes to communication patterns introduced by new information technologies it is increasingly important to understand how deception is produced in new media. In the present study we investigate deception production in text messaging, focusing on how often people lie, about what and to whom. This study uses a novel data collection method that allows for the examination of individuals’ communication records at the message level, which may provide a more accurate account of deception behavior than diary or survey methods. We find that the majority of our participants practiced deception in text messaging. Although lying was a relatively infrequent occurrence for the majority of our participants, there were a small number of prolific liars who told a disproportionately large number of lies using this medium. Additionally, we found some support for the argument that deception occurs less frequently in closer relationships, and we observed how the micro-coordination goals of text messaging change the properties of deceptive text messages relative to face-to-face lies.  相似文献   

18.
在介绍防火墙技术和入侵检测的基础上,分析了网络入侵诱骗技术Honeypot的3种主要技术:IP欺骗技术、重定向型诱骗、网络动态配置。探讨了通过虚拟机软件模拟网络服务实现诱骗环境的方法及系统设计。基于诱骗技术的网络安全系统是入侵检测的扩充,是网络安全技术中的一个新的研究领域,具有广阔的应用前景。  相似文献   

19.
The potential abilities of polarimetric multiple-radar architectures with distributed antennas in electronic counter-countermeasures (ECCMs) are analyzed based on differences between target echoes and deception jamming in scattering coefficients properties. According to the differences in generation mechanism between the target scatter and jamming, a signal model of real targets and deception jamming for two-dimensional vector sensors is established. By applying the Neyman-Pearson (NP) criterion and a hybrid NP-Maximum Posteriori (MAP) criterion, a two-stage detection/discrimination algorithm is proposed. In our proposed algorithm, the targets and jamming are detected in the first stage from a Gaussian noise background. Then, a discriminator based on the generalized likelihood ratio test is designed by exploiting the property of polarization discrimination. A theoretical analysis is also given to evaluate the performance of the second stage of the algorithm. Moreover, the discrimination performance can be improved by optimizing the transmitter polarization parameters. Simulation results indicate that the proposed ECCM strategy is effective against DRFM jamming, especially when JNR is high and transmit polarization is optimally designed.  相似文献   

20.
Speech-to-speech translation technology has difficulties processing elements of spontaneity in conversation. We propose a discourse marker attribute in speech corpora to help overcome some of these problems. There have already been some attempts to annotate discourse markers in speech corpora. However, as there is no consistency on what expressions count as discourse markers, we have to reconsider how to set a framework for annotating, and, in order to better understand what we gain by introducing a discourse marker category, we have to analyse their characteristics and functions in discourse. This is especially important for languages such as Slovenian where no or little research on the topic of discourse markers has been carried out. The aims of this paper are to present a scheme for annotating discourse markers based on the analysis of a corpus of telephone conversations in the tourism domain in the Slovenian language, and to give some additional arguments based on the characteristics and functions of discourse markers that confirm their special status in conversation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号