{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T12:26:19Z","timestamp":1765974379459,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322328"},{"type":"electronic","value":"9783030322335"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32233-5_49","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T22:04:51Z","timestamp":1569967491000},"page":"634-646","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["User-Characteristic Enhanced Model for Fake News Detection in Social Media"],"prefix":"10.1007","author":[{"given":"Shengyi","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xiaoting","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sutong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Haonan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Potthast, M., Kiesel, J., Reinartz, K., Bevendorff, J., Stein, B.: A stylometric inquiry into hyperpartisan and fake news (2017)","key":"49_CR1","DOI":"10.18653\/v1\/P18-1022"},{"key":"49_CR2","series-title":"Lecture Notes in Social Networks","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-94105-9_3","volume-title":"Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining","author":"K Shu","year":"2019","unstructured":"Shu, K., Bernard, H.R., Liu, H.: Studying fake news via network analysis: detection and mitigation. In: Agarwal, N., Dokoohaki, N., Tokdemir, S. (eds.) Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining. LNSN, pp. 43\u201365. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-94105-9_3"},{"doi-asserted-by":"crossref","unstructured":"Rath, B., Gao, W., Ma, J., Srivastava, J.: From retweet to believability: utilizing trust to identify rumor spreaders on twitter. In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 179\u2013186 (2017)","key":"49_CR3","DOI":"10.1145\/3110025.3110121"},{"issue":"7","key":"49_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/2818717","volume":"59","author":"E Ferrara","year":"2016","unstructured":"Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96\u2013104 (2016)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Shu, K., Wang, S., Liu, H.: Understanding user profiles on social media for fake news detection. In: 2018 IEEE Conference on Multimedia Information Processing and Retrieval, pp. 430\u2013435 (2018)","key":"49_CR5","DOI":"10.1109\/MIPR.2018.00092"},{"doi-asserted-by":"crossref","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 675\u2013684 (2011)","key":"49_CR6","DOI":"10.1145\/1963405.1963500"},{"unstructured":"Qazvinian, V., Emily, R., Dragomir, R.R., Qiaozhu, M.: Rumor has it: identifying misinformation in microblogs. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, pp. 1589\u20131599 (2011)","key":"49_CR7"},{"issue":"1","key":"49_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/pra2.2015.145052010082","volume":"52","author":"NJ Conroy","year":"2015","unstructured":"Conroy, N.J., Rubin, V.L., Chen, Y.: Automatic deception detection: methods for finding fake news. Assoc. Inf. Sci. Technol. 52(1), 1\u20134 (2015)","journal-title":"Assoc. Inf. Sci. Technol."},{"issue":"7","key":"49_CR9","doi-asserted-by":"publisher","first-page":"3634","DOI":"10.1016\/j.eswa.2014.12.029","volume":"42","author":"A Heydari","year":"2015","unstructured":"Heydari, A., Tavakoli, M.A., Salim, N., Heydari, Z.: Detection of review spam: a survey. Expert Syst. Appl. 42(7), 3634\u20133642 (2015)","journal-title":"Expert Syst. Appl."},{"unstructured":"Rubin, V.L., Conroy, N.J., Chen, Y.: Towards news verification: deception detection methods for news discourse. In: Hawaii International Conference on System Sciences, pp. 5\u20138 (2015)","key":"49_CR10"},{"doi-asserted-by":"crossref","unstructured":"Yang, F., Liu, Y., Yu, X., Yang, M.: Automatic detection of rumor on Sina Weibo. In: Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics - MDS 2012, pp. 1\u20137 (2012)","key":"49_CR11","DOI":"10.1145\/2350190.2350203"},{"doi-asserted-by":"crossref","unstructured":"Jin, Z., Cao, J., Zhang, Y., Luo, J.: News verification by exploiting conflicting social viewpoints in microblogs. In: Thirtieth AAAI Conference on Artificial Intelligence, pp. 2972\u20132978 (2016)","key":"49_CR12","DOI":"10.1609\/aaai.v30i1.10382"},{"unstructured":"Ma, J., et al.: Detecting rumors from microblogs with recurrent neural networks. In: IJCAI International Joint Conference on Artificial Intelligence, pp. 3818\u20133824 (2016)","key":"49_CR13"},{"key":"49_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-030-04503-6_4","volume-title":"Trends and Applications in Knowledge Discovery and Data Mining","author":"T Chen","year":"2018","unstructured":"Chen, T., Li, X., Yin, H., Zhang, J.: Call attention to rumors: deep attention based recurrent neural networks for early rumor detection. In: Ganji, M., Rashidi, L., Fung, B.C.M., Wang, C. (eds.) PAKDD 2018. LNCS (LNAI), vol. 11154, pp. 40\u201352. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-04503-6_4"},{"unstructured":"Zhang, J., Cui, L., Fu, Y., Gouza, F.B.: Fake news detection with deep diffusive network model (2018)","key":"49_CR15"},{"doi-asserted-by":"crossref","unstructured":"Liu, Y., Wu, Y.B.: Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks. In: Thirty-Second AAAI Conference on Artificial Intelligence, pp. 354\u2013361 (2018)","key":"49_CR16","DOI":"10.1609\/aaai.v32i1.11268"},{"doi-asserted-by":"crossref","unstructured":"Ma, J., Gao, W., Wong, K.: Detect rumors in microblog posts using propagation structure via kernel learning. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, pp. 708\u2013717 (2016)","key":"49_CR17","DOI":"10.18653\/v1\/P17-1066"},{"doi-asserted-by":"crossref","unstructured":"Wang, W.Y.: \u201cLiar, liar pants on fire\u201d: a new benchmark dataset for fake news detection (2017)","key":"49_CR18","DOI":"10.18653\/v1\/P17-2067"},{"unstructured":"Karimi, H., Roy, P., Saba-Sadiya, S., Tang, J.: Multi-source multi-class fake news detection. In: Proceedings of the 27th International Conference on Computational Linguistics, pp. 1546\u20131557 (2018)","key":"49_CR19"},{"unstructured":"Ruchansky, N., Seo, S., Liu, Y.: CSI: a hybrid deep model for fake news detection. In: Proceedings of the 2017 ACM on Conference on Information and Knowledge Management - CIKM 2017, pp. 797\u2013806 (2017)","key":"49_CR20"},{"unstructured":"Shu, K., Wang, S., Liu, H.: Beyond news contents: the role of social context for fake news detection. In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, pp. 312\u2013320 (2017)","key":"49_CR21"},{"unstructured":"Yang, Y., Zheng, L., Zhang, J., Cui, Q., Li, Z., Yu, P.S.: TI-CNN: convolutional neural networks for fake news detection (2018)","key":"49_CR22"},{"issue":"1","key":"49_CR23","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","volume":"27","author":"M McPherson","year":"2002","unstructured":"McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: homophily in social networks. Annu. Rev. Sociol. 27(1), 415\u2013444 (2002)","journal-title":"Annu. Rev. Sociol."},{"doi-asserted-by":"crossref","unstructured":"Tsur, O., Rappoport, A.: What\u2019s in a hashtag?: content based prediction of the spread of ideas in microblogging communities. In: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining \u2013 WSDM 2012, p. 643 (2012)","key":"49_CR24","DOI":"10.1145\/2124295.2124320"},{"doi-asserted-by":"crossref","unstructured":"Huang, X., Li, J., Hu, X.: Accelerated attributed network embedding. In: Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 633\u2013641 (2017)","key":"49_CR25","DOI":"10.1137\/1.9781611974973.71"},{"doi-asserted-by":"crossref","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations Bryan. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2014, pp. 701\u2013710 (2014)","key":"49_CR26","DOI":"10.1145\/2623330.2623732"},{"doi-asserted-by":"crossref","unstructured":"Volkova, S., Shaffer, K., Jang, J.Y., Hodas, N.: Separating facts from fiction: linguistic models to classify suspicious and trusted news posts on twitter. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, pp. 647\u2013653 (2017)","key":"49_CR27","DOI":"10.18653\/v1\/P17-2102"},{"unstructured":"Shu, K., Mahudeswaran, D., Wang, S., Lee, D., Liu, H.: FakeNewsNet: a data repository with news content, social context and spatial temporal information for studying fake news on social media (2018)","key":"49_CR28"},{"unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space (2013)","key":"49_CR29"},{"doi-asserted-by":"crossref","unstructured":"Yu, F., Liu, Q., Wu, S., Wang, L., Tan, T.: A convolutional approach for misinformation identification (2017)","key":"49_CR30","DOI":"10.24963\/ijcai.2017\/545"}],"container-title":["Lecture Notes in Computer Science","Natural Language Processing and Chinese Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32233-5_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:11:33Z","timestamp":1710353493000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-32233-5_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030322328","9783030322335"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32233-5_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NLPCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF International Conference on Natural Language Processing and Chinese Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dunhuang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nlpcc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tcci.ccf.org.cn\/conference\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"softconf","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"492","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}