
Lina Zhou- China University of Geosciences
Lina Zhou
- China University of Geosciences
About
99
Publications
60,608
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,345
Citations
Current institution
Publications
Publications (99)
The proliferation of fake news, more recently multimodal fake news, poses a significant threat to individuals, organizations, and society. While online social media platforms have employed automated methods to combat fake news, they face two notable challenges: the scarcity of labeled data and the diversity of news domains. To enhance the effective...
Content moderation is a widely used strategy to prevent the dissemination of irregular information on social media platforms. Despite extensive research on developing automated models to support decision-making in content moderation, there remains a notable scarcity of studies that integrate the rules of online communities into content moderation....
The landscape of social media content has evolved significantly, extending from text to multimodal formats. This evolution presents a significant challenge in combating misinformation. Previous research has primarily focused on single modalities or text-image combinations, leaving a gap in detecting multimodal misinformation. While the concept of e...
The landscape of social media content has evolved significantly, extending from text to multimodal formats. This evolution presents a significant challenge in combating misinformation. Previous research has primarily focused on single modalities or text-image combinations, leaving a gap in detecting multimodal misinformation. While the concept of e...
Stance detection categorizes the stance toward a specific target or topic, or other aspects of interest (e.g., a social media comment) as favor, against, or neutral. The discourse of stance detection has evolved from court debate to social media, particularly in the analyses of political, social, and health issues. Despite its long-standing history...
Content moderation is a common intervention strategy for reviewing user-generated content on social media platforms. Engaging users in content moderation is promising for making ethical and fair moderation decisions. A few studies that have considered user engagement in content moderation have primarily focused on classifying user-generated comment...
Assistive technology is extremely important for maintaining and improving the elderly’s quality of life. Biometrics-based mobile user authentication (MUA) methods have witnessed rapid development in recent years owing to their usability and security benefits. However, there is a lack of a comprehensive review of such methods for the elderly. The pr...
Fake news is being generated in different languages, yet existing studies are dominated by English news. The analysis of fake news content has focused on lexical and stylometric features, giving little attention to semantic features. A few studies involving semantic features have either used them as the inputs to classifiers with no interpretations...
The widespread threat of phishing emails poses significant economic and social challenges. Existing research mainly focuses on developing methods for automated detection of phishing emails. Few studies have explored the influence of demographic factors of phishing targets on phishing victimization, particularly in the workplace. To fill the gap, we...
Password-based mobile user authentication is vulnerable to a variety of security threats. Shoulder-surfing is the key to those security threats. Despite a large body of research on password security with mobile devices, existing studies have focused on shaping the security behavior of mobile users by enhancing the strengths of user passwords or by...
BACKGROUND
Mobile Mental Health Systems (MMHS) have been increasingly developed and deployed in support of monitoring, management, and intervention of patients with mental disorders. However, many of them rely on patient data collected by smartphones and/or other wearable devices to infer patients’ mental status, which raises privacy concerns. Such...
Background
Mobile mental health systems (MMHS) have been increasingly developed and deployed in support of monitoring, management, and intervention with regard to patients with mental disorders. However, many of these systems rely on patient data collected by smartphones or other wearable devices to infer patients’ mental status, which raises priva...
Inconsistency in online consumer reviews (OCRs) may cause uncertainty and confusion to consumers when they make purchase decisions. However, there is a lack of a systematic and empirical investigation of review inconsistency in the literature. This research characterizes review inconsistency from multiple aspects, including rating-sentiment, conten...
Background:
Social media have emerged as a platform for experience and knowledge sharing in the medical community. The online medical community is garnering increasing research attention; however, there is a lack of understanding of what factors influence the helpfulness and engagement of experience sharing in the community.
Methods:
Clinical do...
Mobile user authentication (MUA) has become a gatekeeper for securing a wealth of personal and sensitive information residing on mobile devices. Keystrokes and touch gestures are two types of touch behaviors. It is not uncommon for a mobile user to make multiple MUA attempts. Nevertheless, there is a lack of an empirical comparison of different typ...
Misinformation has attracted widespread research attention owing to the importance and challenges of addressing the problem. Despite the progress in developing computational methods for misinformation detection and identifying psycholinguistic factors and network properties of misinformation, there is a lack of understanding of language alternation...
Effective use of online consumer reviews is hampered by uncertainty about their helpfulness. Despite a growing body of knowledge on indicators of review helpfulness, previous studies have overlooked rich semantic information embedded in review content. Following design science principles, this study introduces a semantic hierarchy of product featur...
The QWERTY keyboard on mobile devices usually requires users’ full visual attention and both hands, which is not always possible. We propose a thumb-stroke-based keyboard, ThumbStroke, to support both sight-free and one-handed text entry. Text entry via ThumbStroke completely relies on the directions of thumb strokes at any place on the screen of a...
Background and objective:
Hypoglycemia is a common safety event when attempting to optimize glycemic control in diabetes (DM). While electronic medical records provide a natural ground for detecting and analyzing hypoglycemia, ICD codes used in the databases may be invalid, insensitive or non-specific in detecting new hypoglycemic events. We devel...
Background:
Adverse Event (AE) ontology can be used to support interoperability and computer-assisted reasoning of AEs. Despite significant progress in developing biomedical ontologies, they are facing the obstacle of adoption partly because those ontologies are too general to meet the requirements of a specific domain. Understanding and represent...
Recent advances in sensing and wireless communication technologies have led to an explosion in the use of touch-screen mobile devices such as smartphones and tablets in mobile commerce and other daily work and life activities. These activities have resulted in more and more private and sensitive information stored on those devices. Therefore, impro...
Objectives
This study investigates the public’s opinions on a new school meals policy for childhood obesity prevention, discovers aspects concerning those opinions, and identifies possible gender and regional differences in the U.S.
Methods
We collected 14,317 relevant tweets from 11,715 users since the national policy enactment on Feb 9, 2010 thr...
The pervasive and prevalent use of touch-screen mobile phones in both work and daily life has generated more and more private and sensitive information on those devices. Accordingly, there is an ever-increasing need to improve the security of mobile phones. Recent advances in mobile user authentication technologies mainly focus on entry-point authe...
Behavioral cues to deception are instrumental to detecting deception. As one of the primary sources of deception behavior, text has been analyzed at the level of sub-sentence or message but not the discourse of interaction. Additionally, empirical studies on cues to deception in the case of multiple receivers remain nonexistent. To fill these voids...
Deception has been an important problem in interactive groups, impeding effective group communication and group work, yet deception detection in such a context remains understudied. Extrapolated from the interpersonal deception theory (IDT) and group composition research in cooperative contexts, this research proposes that group factors, including...
Managing personal information such as to-dos and contacts has become our daily routines, consuming more time than needed. Existing PIM tools require extensive involvement of human users. This becomes a problem in using mobile devices due to their physical constraints. To address the limitations of traditional PIM tools, we propose a model of mobile...
Deception in computer-mediated group Negotiation and decision making presents a variety of risks. Gaining a better understanding of online deception has important implications for both individuals and organizations. Despite the rapidly increasing number of online deception cases reported in recent years, extant deception research has not considered...
Although speech recognition technology has made remarkable progress, its wide adoption is still restricted by notable effort made and frustration experienced by users while correcting speech recognition errors. One of the promising ways to improve error correction is by providing user support. Although support mechanisms have been proposed for inli...
We theoretically and experimentally investigate a microwave photonic filter with an electrooptic phase modulator and an array waveguide grating, which acts as a detuned two-channel wavelength division de-multiplexer. In the experiment, a microwave notch filter with a QN factor of 236 and a rejection ratio of 31 dB is obtained by introducing microwa...
Accessing the Web from mobile handheld devices has become increasingly common. However, accomplishing that task remains challenging mainly due to the physical constraints of handheld devices and the static presentation of Web pages. Adapting the presentation of Web pages is, therefore, critical to enabling effective mobile Web browsing and informat...
We propose and demonstrate a novel microwave photonic filter based on an electro-optic phase modulator (EOPM), a tunable optical bandpass filter (TOBF) and a cascaded fiber delay interferometer (DI). The TOBF is slightly detuned relative to the optical carrier. By using the complementary optical responses of the two output ports of DI, one port of...
We propose and demonstrate a novel switchable microwave photonic filter based on phase modulation. Both a microwave high Q bandpass filter and a microwave notch filter with flat passband are achieved respectively. And the switchability between them by tuning the two tunable optical bandpass filters is demonstrated. We also present a theoretical mod...
Although speech recognition has improved significantly in recent years, its adoption continues to be limited, in part, by the effort and frustration associated with correcting speech recognition errors. Error detection is a particularly challenging issue in third-party error correction where different individuals are responsible for the original di...
A novel technique to implement a microwave photonic filter structure with multiple taps and arbitrary frequency response is presented. The proposed filter is based on Four-Wave Mixing (FWM) and Cross-Gain Modulation (XGM) in a semiconductor optical amplifier (SOA). Two-tap notch filter and three-tap bandpass filter with arbitrary bipolar tap genera...
We propose and experimentally demonstrate a novel all-optical microwave filter with high frequency selectivity. It is based on a recirculating delay line (RDL) loop in which a semiconductor optical amplifier (SOA) is followed by a tunable narrowband optical filter and a 1 × 2 10:90 optical coupler. Converted signal used as a negative tap is generat...
A new tunable cascaded infinite impulse response (IIR) microwave photonic filter is presented, based on a novel configuration in which a semiconductor optical amplifier (SOA) is inserted between two active recirculating delay line (RDL) loops. Due to wavelength conversion with cross-gain modulation (XGM) in SOA, interferences between light beams tr...
This study examines trust in technology-supported groups from the perspectives of culture, social presence, and group composition. Our results demonstrate that, in culturally homogeneous groups, individualism has a negative impact on the level of interpersonal trust; however, in culturally heterogeneous groups consisting of Chinese and U.S. partici...
A new cascaded microwave photonic filter that can realize a high Q value is presented. It consists of two infinite impulse response filters based on two active loops. Owing to wavelength conversion employing cross-gain modulation of the amplified spontaneous emission spectrum of the semiconductor optical amplifier in one loop, the interference betw...
As the use of mobile handheld devices for Web access becomes increasingly popular, ease of use has become an important issue
for mobile devices. However, due to their small screen size, users often suffer from the poor content presentation that seriously
hinders the usability of Mobile Web applications. Therefore, adapting Web content presentation...
An all-optical filter structure to simultaneously implement microwave bandpass and notch filter is proposed and experimentally
demonstrated. The structure is based on a recirculating delay line (RDL) loop consisting of a semiconductor optical amplifier
(SOA) followed by a tunable narrowband optical filter and a 10:90 coupler. The converted signal i...
A microwave photonic interference mitigation filter is proposed and experimentally demonstrated. The structure is based on a recirculating delay line loop comprising a semiconductor optical amplifier (SOA) and a tunable narrowband optical filter. Converted signal used as negative tap is generated through wavelength conversion employing cross-gain m...
Monitoring of cognitive and physical function is central to the care of people with or at risk for various health conditions, but existing solutions rely on intrusive methods that are inadequate for continuous tracking. Less intrusive techniques that facilitate more accurate and frequent monitoring of the status of cognitive or physical function be...
A microwave photonic filter with passband and stopband interchanged is proposed and demonstrated. The structure is based on a recirculating delay line loop comprising a semiconductor optical amplifier (SOA) and a tunable narrowband optical filter, converted signal used as negative tap is generated employing the cross-gain modulation of the amplifie...
This paper first presents the fundamental principles of the microwave photonic filters. As an example to explain how to implement
a microwave photonic filter, a specific finite impulse response (FIR) filter is illustrated. Next, the Q value of the microwave photonic filters is analyzed theoretically, and methods around how to gain high Q value are...
An all-optical filter structure for interference mitigation of microwave signals is proposed and demonstrated. The structure is based on a recirculating delay line loop (RDLL) and a fiber Bragg grating. The RDLL is comprised of a semiconductor optical amplifier (SOA) followed by a tunable narrowband optical filter and an optical variable delay line...
A novel microwave photonic notch filter structure is proposed and experimentally demonstrated. The structure is based on a recirculating delay line loop consisting of an optical variable delay line, a semiconductor optical amplifier (SOA) and a tunable narrowband optical filter. Negative tap is generated using wavelength conversion based on cross-g...
This paper firstly presents the fundamental principles of the microwave photonic filters. According to the number of the taps of the microwave signal is finite either infinite, a microwave photonic filter is classified into finite impulse response (FIR) filter and infinite impulse response (IIR) filter. As an example to explain how to implement a m...
An all-optical filter structure for interference suppression of microwave signals is presented. The filter is based on a recirculating delay line (RDL) loop consisting of a semiconductor optical amplifier (SOA) followed by a tunable narrowband optical filter, and a fiber Bragg grating connected after the RDL loop. Negative tap is generated in wavel...
This paper firstly presents the fundamental principles of the microwave photonic filters. According to the number of the taps of the microwave signal is finite either infinite, a microwave photonic filter is classified into finite impulse response (FIR) filter and infinite impulse response (IIR) filter. As an example to explain how to implement a m...
A number of studies have been conducted, providing linguistic cues about deception in online communication and leading to the development of models for automatic deception detection. These studies have demonstrated that these linguistic cues and models can be used to, to assist people in detecting online deception and to increase public awareness a...
Online deception is disrupting our daily life, organizational process, and even national security. Existing approaches to online deception detection follow a traditional paradigm by using a set of cues as antecedents for deception detection, which may be hindered by ineffective cue identification. Motivated by the strength of statistical language m...
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Software is developed in a dynamic context where team structure, requirements, and processes evolve together with the product. Although researchers have been studying the evolution of software systems since the early 70s, the study on the evolution of software development teams remains rare. Such evolutionary patterns and their impact on software q...
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Motivated by the practical significance of deception detection to both organizations and individuals and the recent surge of research interests in deception in computer-mediated communication (CMC), this study examines whether and how the modality of communication media can influence deception detection in CMC. The results of empirical evaluations...
The importance of research on misinformation has received wide recognition. Two major challenges faced by this research community are the lack of theoretical models and the scarcity of misinformation in support of such research. This paper aims to address the aforementioned challenges by conceptualizing misinformation and enabling the interoperabil...
Majority influence is the attempt by a majority of group members to impose their common position on group dissenters during group decision making. Because of globalization, the use of cross-cultural teams in group tasks is becoming increasingly common. The objective of this study was to investigate how national culture, social presence, and group d...
This study investigates whether some speech recognition (SR) errors are easier to detect and what patterns can be identified from those errors. Specifically, SR errors were examined from both non-linguistic and linguistic perspectives. The analyses of non-linguistic properties revealed that high error ratios and consecutive errors lowered the ease...
Collaborative commerce (C-Commerce) is a set of technologies and business practices that allows companies to build stronger relationships with their trading partners through integrating complex and cross-enterprise processes governed by business logic and rules, as well as workflows. Business Process Management (BPM) is a key element of C-Commerce...
In this empirical study we examine the impact of national culture and social presence on interpersonal trust in both culturally homogeneous and heterogeneous groups. Results demonstrate that interpersonal trust is higher in homogeneous, low-individualism groups (represented by Chinese participants) than that in homogeneous, high-individualism group...
ABATRACT Since the late 1990s, online shopping has taken off as an increasing number of consumers purchase increasingly diversified products on the Internet. Given that how to attract and retain consumers is critical to the success of online retailers, research on the antecedents of consumer acceptance of online shopping has attracted widespread at...
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
A variety of knowledge sources have been employed by error correction mechanisms to improve the usability of speech recognition (SR) technology. However, little is known about the effect of knowledge sources on human error correction. Advancing our understanding of the role of knowledge sources in human error correction could improve the state of a...
The great potential of speech recognition systems in freeing users' hands while interacting with computers has inspired a variety of promising applications. However, given the performance of the state-of-the-art speech recognition technology today, widespread acceptance of speech recognition technology would not be realistic without designing and d...
Deception can be detrimental to individual and organizational decision mak- ing. Existing research on behavioral cues to deception has focused mainly on monologue and dyadic interaction. No studies have empirically examined the impact of group size on behavioral cues to deception. This study is the first attempt to investigate whether deceivers beh...
Interactive video in an e-learning system allows proactive and random access to video content. Our empirical study examined the influence of interactive video on learning outcome and learner satisfaction in e-learning environments. Four different settings were studied: three were e-learning environments—with interactive video, with non-interactive...
Web stores, where buyers place orders over the Internet, have emerged to become a prevalent sales channel. In this research, we developed neural network models, which are known for their capability of modeling noncompensatory decision processes, to predict and explain consumer choice between web and traditional stores. We conducted an empirical sur...
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
The efficiency promised by a dictation speech recognition (DSR) system is lessened by the need for correcting recognition errors. Error detection is the precursor of error correction. Developing effective techniques for error detection can thus lead to improved error correction. Current research on error detection has focused mainly on transcriptio...
Building composite Web services can save significant time and cost for developing new applications and enhancing the interoperability and collaboration among E-business partners. This article proposes a framework for dynamic and personalized composition of Web services using an approach that integrates not only functional attributes of Web services...
Speech recognition (SR) is a technology that can improve accessibility to computer systems for people with physical disabilities or situation-introduced disabilities. The wide adoption of SR technology; however, is hampered by the difficulty in correcting system errors. HCI researchers have attempted to improve the error correction process by emplo...
Deception detection (DD) is infused with uncertainty due to vagueness and imprecision. To address the above issue, we developed a Model of Uncertainty in Deception Detection (MUDD) and selected the Neuro-Fuzzy classifier to predict deception. A Neuro-fuzzy model integrates the fuzzy set and logic for handling uncertainty with artificial neural netw...
In order to reduce costs and gain competitive advantages, many companies are offering web services that enable software components to be accessed by their customers and trading partners over the internet. With the latest advances in mobile computing and communication technologies, web services are increasingly used to expose functionalities of many...
Recognition errors hinder the prolifera- tion of speech recognition (SR) systems. Based on the observation that recogni- tion errors may result in ungrammatical sentences, especially in dictation appli- cation where an acceptable level of ac- curacy of generated documents is indis- pensable, we propose to incorporate two kinds of linguistic feature...
With the increase of economic globalization and evolution of information technology, financial data are being generated and accumulated at an unprecedented pace. As a result, there has been a critical need for automated approaches to effective and efficient utilization of massive amount of financial data to support companies and individuals in stra...
Natural language interface (NLI) facilitates the human use of computers. In this paper, we review the state-of-the-art NLI application. Based on the extant literature, we design process flow of an NLI system enabling easy information access via mobile devices. Full Text at Springer, may require registration or fee
The importance of misinformation research has received wide recognition. However, one major challenge facing the research community is the lack of misinformation data and the difficulty in managing such data. Motivated by the role of ontology in information sharing and reuse, we propose a misinformation ontology and its representation based on the...
The advantages of electeronic learning technology over the traditional class room learning system are discussed. In comparison with the traditional class room learning that centres on instructors, electronic learning offers a learner-centered self-paced learning environment. More multimedia based e-learning systems are becoming available to integra...
Dominance is not only a complicated social phenomenon that involves interpersonal dynamics, but also an effective strategy used in various applications such as deception detection, negotiation, and online community. The extensive literature on dominance has primarily focused on the personality traits and socio-biological influence, as well as vario...
The increased chance of deception in computer-mediated communication and the potential risk of taking action based on deceptive information calls for automatic detection of deception. To achieve the ultimate goal of automatic prediction of deception, we selected four common classification methods and empirically compared their performance in predic...
The detection of deception is a promising but challenging task. A systematic discussion of automated Linguistics Based Cues (LBC) to deception has rarely been touched before. The experiment studied the effectiveness of automated LBC in the context of text-based asynchronous computer mediated communication (TA-CMC). Twenty-seven cues either extracte...
Nowadays, multimedia-based e-Learning systems have become widely available. Many systems, however, provide little interactivity to learners. E-Learners do not have much control over learning content and process to meet their individual needs. Therefore, we face challenges of how to integrate instructional material in different media and how to prov...
Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textual information transmitted through Computer-mediated Communication, CMC, people remain largely...
The role of information retrieval (IR) in support of decision making and knowledge management has become increasingly significant. Confronted by various problems in traditional keyword-based IR, many researchers have been investigating the potential of natural language processing (NLP) technologies. Despite widespread application of NLP in IR and h...
The detection of deception is a promising but challenging task. Previous exploratory research on deception in computer-mediated
communication found that language cues were effective in differentiating deceivers from truth-tellers. However, whether and
how these language cues change over time remains an open issue. In this paper, we investigate the...
The major challenge in current humanitarian assistance/disaster relief (HA/DR) efforts is that diverse information and knowledge are widely distributed and owned by different organizations. These resources are not efficiently organized and utilized during HA/DR operations. We present a knowledge management framework that integrates multiple informa...
Ontology is a crucial component in knowledge management and organizational learning. Despite the widespread ontology-related research and applications, developing domain ontologies remains a challenging issue. Ontology development for underdeveloped domains, which have no structural resources in existence, becomes even more difficult and time-consu...
Driven by the collaborative technology, COllaborative SYstems (COSY) facilitate information management in the organizations. In face of the dynamic and information-overloaded age, knowledge management (KM) has been recognized as an effective solution in the past few years. Thus, merging the force of COSY and KM will be very promising in increasing...
Awareness of the need for business analysis has grown faster than the evolution of tools to support collaborative development of business analysis models. Involvement of key personnel is important for model accuracy and buy-in, which is not trivial, especially if they are distributed geographically. Traditionally, models have been developed by indi...
Customers' attitude toward online shopping is the key to the survival and profitability of Internet retailers in the intensely competitive market. Aiming to automatically discover knowledge for predicting customers' attitude toward Internet retailers in relative to traditional retailers, we examine two classification approaches, decision trees and...