{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:11:02Z","timestamp":1776442262077,"version":"3.51.2"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030039271","type":"print"},{"value":"9783030039288","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03928-8_17","type":"book-chapter","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T11:21:01Z","timestamp":1541676061000},"page":"206-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Evaluating Deep Neural Networks for Automatic Fake News Detection in Political Domain"],"prefix":"10.1007","author":[{"given":"Francis C.","family":"Fern\u00e1ndez-Reyes","sequence":"first","affiliation":[]},{"given":"Suraj","family":"Shinde","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"publisher","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on Twitter. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, pp. 675\u2013684. ACM, New York (2011). https:\/\/doi.org\/10.1145\/1963405.1963500","DOI":"10.1145\/1963405.1963500"},{"key":"17_CR2","first-page":"265","volume":"2","author":"K Crammer","year":"2002","unstructured":"Crammer, K., Singer, Y.: On the algorithmic implementation of multiclass kernel-based vector machines. J. Mach. Learn. Res. 2, 265\u2013292 (2002). http:\/\/dl.acm.org\/citation.cfm?id=944790.944813","journal-title":"J. Mach. Learn. Res."},{"issue":"5199","key":"17_CR3","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1126\/science.267.5199.843","volume":"267","author":"M Damashek","year":"1995","unstructured":"Damashek, M.: Gauging similarity with n-grams: language-independent categorization of text. Science 267(5199), 843\u2013848 (1995)","journal-title":"Science"},{"key":"17_CR4","unstructured":"Feng, S., Banerjee, R., Choi, Y.: Syntactic stylometry for deception detection. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers-Volume 2, pp. 171\u2013175. Association for Computational Linguistics (2012)"},{"issue":"5","key":"17_CR5","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.neunet.2005.06.042","volume":"18","author":"A Graves","year":"2005","unstructured":"Graves, A., Schmidhuber, J.: Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Netw. 18(5), 602\u2013610 (2005). iJCNN 2005. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0893608005001206","journal-title":"Neural Netw."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Hai, Z., Zhao, P., Cheng, P., Yang, P., Li, X.L., Li, G.: Deceptive review spam detection via exploiting task relatedness and unlabeled data. In: Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, pp. 1817\u20131826 (2016)","DOI":"10.18653\/v1\/D16-1187"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Ishak, A., Chen, Y., Yong, S.P.: Distance-based hoax detection system. In: 2012 International Conference on Computer and Information Science (ICCIS), vol. 1, pp. 215\u2013220. IEEE (2012)","DOI":"10.1109\/ICCISci.2012.6297242"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Kim, Y.: Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 (2014)","DOI":"10.3115\/v1\/D14-1181"},{"key":"17_CR9","unstructured":"Mason, J.: Filtering spam with SpamAssassin. In: HEANet Annual Conference, p. 103 (2002)"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Mihalcea, R., Strapparava, C.: The lie detector: explorations in the automatic recognition of deceptive language. In: Proceedings of the ACL-IJCNLP 2009 Conference Short Papers, pp. 309\u2013312. Association for Computational Linguistics (2009)","DOI":"10.3115\/1667583.1667679"},{"key":"17_CR11","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111\u20133119 (2013)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Rosas, V., Mihalcea, R.: Experiments in open domain deception detection. In: Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing, pp. 1120\u20131125 (2015)","DOI":"10.18653\/v1\/D15-1133"},{"key":"17_CR13","unstructured":"Petkovi\u0107, T., Kostanj\u010dar, Z., Pale, P.: E-mail system for automatic hoax recognition. In: MIPRO CIS-Inteligentni sustavi (2005)"},{"issue":"1","key":"17_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22\u201336 (2017)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Stolcke, A.: SRILM-an extensible language modeling toolkit. In: Seventh International Conference on Spoken Language Processing (2002)","DOI":"10.21437\/ICSLP.2002-303"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Volkova, S., Shaffer, K., Jang, J.Y., Hodas, N.: Separating facts from fiction: linguistic models to classify suspicious and trusted news posts on Twitter. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), vol. 2, pp. 647\u2013653 (2017)","DOI":"10.18653\/v1\/P17-2102"},{"key":"17_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1007\/978-3-642-04595-0_39","volume-title":"Knowledge-Based and Intelligent Information and Engineering Systems","author":"M Vukovi\u0107","year":"2009","unstructured":"Vukovi\u0107, M., Pripu\u017ei\u0107, K., Belani, H.: An intelligent automatic hoax detection system. In: Vel\u00e1squez, J.D., R\u00edos, S.A., Howlett, R.J., Jain, L.C. (eds.) KES 2009. LNCS (LNAI), vol. 5711, pp. 318\u2013325. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04595-0_39"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Wang, W.Y.: \u201cLiar, liar pants on fire\u201d: a new benchmark dataset for fake news detection. arXiv preprint arXiv:1705.00648 (2017)","DOI":"10.18653\/v1\/P17-2067"},{"issue":"10","key":"17_CR19","doi-asserted-by":"publisher","first-page":"4010","DOI":"10.1016\/j.eswa.2013.01.008","volume":"40","author":"I Yevseyeva","year":"2013","unstructured":"Yevseyeva, I., Basto-Fernandes, V., Ruano-Ord\u00e1S, D., M\u00e9Ndez, J.R.: Optimising anti-spam filters with evolutionary algorithms. Expert Syst. Appl. 40(10), 4010\u20134021 (2013)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence \u2013 IBERAMIA 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03928-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T18:03:54Z","timestamp":1729361034000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03928-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030039271","9783030039288"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03928-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"IBERAMIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ibero-American Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Trujillo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iberamia2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iberamia.org\/iberamia\/iberamia2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}