{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:37:54Z","timestamp":1774161474317,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030369866","type":"print"},{"value":"9783030369873","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-36987-3_17","type":"book-chapter","created":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T05:34:36Z","timestamp":1577856876000},"page":"266-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["A Hybrid Approach for Fake News Detection in Twitter Based on User Features and Graph Embedding"],"prefix":"10.1007","author":[{"given":"Tarek","family":"Hamdi","sequence":"first","affiliation":[]},{"given":"Hamda","family":"Slimi","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Bounhas","sequence":"additional","affiliation":[]},{"given":"Yahya","family":"Slimani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"17_CR1","unstructured":"Abu-El-Haija, S., Perozzi, B., Al-Rfou, R., Alemi, A.A.: Watch your step: learning node embeddings via graph attention. In: Advances in Neural Information Processing Systems, pp. 9180\u20139190 (2017). abs\/1710.09599"},{"key":"17_CR2","unstructured":"Aggarwal, G., Patel, V., Varshney, G., Oostman, K.: Understanding the social factors affecting the cryptocurrency market (2019). arXiv preprint arXiv:1901.06245"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed, A., Shervashidze, N., Narayanamurthy, S., Josifovski, V., Smola, A.J.: Distributed large-scale natural graph factorization. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 37\u201348. ACM (2013)","DOI":"10.1145\/2488388.2488393"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Al-Qurishi, M., Al-Rakhami, M., Alrubaian, M., Alarifi, A., Rahman, S.M.M., Alamri, A.: Selecting the best open source tools for collecting and visualzing social media content. In: 2015 2nd World Symposium on Web Applications and Networking (WSWAN), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/WSWAN.2015.7210346"},{"issue":"2","key":"17_CR5","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"H Allcott","year":"2017","unstructured":"Allcott, H., Gentzkow, M.: Social media and fake news in the 2016 election. J. Econ. Perspect. 31(2), 211\u201336 (2017)","journal-title":"J. Econ. Perspect."},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"2828","DOI":"10.1109\/ACCESS.2018.2886314","volume":"7","author":"M Alrubaian","year":"2018","unstructured":"Alrubaian, M., Al-Qurishi, M., Alamri, A., Al-Rakhami, M., Hassan, M.M., Fortino, G.: Credibility in online social networks: a survey. IEEE Access 7, 2828\u20132855 (2018)","journal-title":"IEEE Access"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Belkin, M., Niyogi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: Advances in Neural Information Processing Systems, pp. 585\u2013591 (2002)","DOI":"10.7551\/mitpress\/1120.003.0080"},{"issue":"9","key":"17_CR8","doi-asserted-by":"publisher","first-page":"1616","DOI":"10.1109\/TKDE.2018.2807452","volume":"30","author":"H Cai","year":"2018","unstructured":"Cai, H., Zheng, V.W., Chang, K.C.C.: A comprehensive survey of graph embedding: problems, techniques, and applications. IEEE Trans. Knowl. Data Eng. 30(9), 1616\u20131637 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Canini, K.R., Suh, B., Pirolli, P.L.: Finding credible information sources in social networks based on content and social structure. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp. 1\u20138. IEEE (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.91"},{"issue":"5","key":"17_CR10","doi-asserted-by":"publisher","first-page":"056105","DOI":"10.1103\/PhysRevE.84.056105","volume":"84","author":"CH Comin","year":"2011","unstructured":"Comin, C.H., da Fontoura Costa, L.: Identifying the starting point of a spreading process in complex networks. Phys. Rev. E 84(5), 056105 (2011)","journal-title":"Phys. Rev. E"},{"issue":"1","key":"17_CR11","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1017\/S1481803500013336","volume":"8","author":"J Fan","year":"2006","unstructured":"Fan, J., Upadhye, S., Worster, A.: Understanding receiver operating characteristic (ROC) curves. Can. J. Emerg. Med. 8(1), 19\u201320 (2006)","journal-title":"Can. J. Emerg. Med."},{"issue":"3\u20135","key":"17_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3\u20135), 75\u2013174 (2010)","journal-title":"Phys. Rep."},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.knosys.2018.03.022","volume":"151","author":"P Goyal","year":"2018","unstructured":"Goyal, P., Ferrara, E.: Graph embedding techniques, applications, and performance: a survey. Knowl. Based Syst. 151, 78\u201394 (2018)","journal-title":"Knowl. Based Syst."},{"issue":"6425","key":"17_CR14","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1126\/science.aau2706","volume":"363","author":"N Grinberg","year":"2019","unstructured":"Grinberg, N., Joseph, K., Friedland, L., Swire-Thompson, B., Lazer, D.: Fake news on twitter during the 2016 US presidential election. Science 363(6425), 374\u2013378 (2019)","journal-title":"Science"},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Grover, A., Leskovec, J.: Node2vec: scalable feature learning for networks. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2016, pp. 855\u2013864. ACM (2016). https:\/\/doi.org\/10.1145\/2939672.2939754","DOI":"10.1145\/2939672.2939754"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Gupta, A., Lamba, H., Kumaraguru, P., Joshi, A.: Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 729\u2013736. ACM (2013)","DOI":"10.1145\/2487788.2488033"},{"key":"17_CR17","unstructured":"Hamilton, W.L., Ying, R., Leskovec, J.: Representation learning on graphs: methods and applications (2017). arXiv preprint arXiv:1709.05584"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Hassan, N.Y., Gomaa, W.H., Khoriba, G.A., Haggag, M.H.: Supervised learning approach for twitter credibility detection. In: 2018 13th International Conference on Computer Engineering and Systems (ICCES), pp. 196\u2013201. IEEE (2018)","DOI":"10.1109\/ICCES.2018.8639315"},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","volume":"5","author":"M Hossin","year":"2015","unstructured":"Hossin, M., Sulaiman, M.: A review on evaluation metrics for data classification evaluations. Int. J. Data Min. Knowl. Manag. Process 5(2), 1 (2015)","journal-title":"Int. J. Data Min. Knowl. Manag. Process"},{"issue":"9","key":"17_CR20","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2013.6588663","volume":"51","author":"L Jin","year":"2013","unstructured":"Jin, L., Chen, Y., Wang, T., Hui, P., Vasilakos, A.V.: Understanding user behavior in online social networks: a survey. IEEE Commun. Mag. 51(9), 144\u2013150 (2013)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR21","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, pp. 3146\u20133154 (2017)"},{"issue":"1","key":"17_CR22","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.ijinfomgt.2017.08.003","volume":"38","author":"J Kim","year":"2018","unstructured":"Kim, J., Hastak, M.: Social network analysis: characteristics of online social networks after a disaster. Int. J. Inf. Manag. 38(1), 86\u201396 (2018)","journal-title":"Int. J. Inf. Manag."},{"issue":"Nov","key":"17_CR23","first-page":"2579","volume":"9","author":"LVD Maaten","year":"2008","unstructured":"Maaten, L.V.D., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(Nov), 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"17_CR24","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1145\/2556612","volume":"8","author":"J Mcauley","year":"2014","unstructured":"Mcauley, J., Leskovec, J.: Discovering social circles in ego networks. ACM Trans. Knowl. Discov. Data 8(1), 4:1\u20134:28 (2014). https:\/\/doi.org\/10.1145\/2556612","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"17_CR25","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space (2013). arXiv preprint arXiv:1301.3781"},{"key":"17_CR26","unstructured":"Mitra, T., Gilbert, E.: CREDBANK: a large-scale social media corpus with associated credibility annotations. In: Ninth International AAAI Conference on Web and Social Media (2015)"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Myers, S.A., Sharma, A., Gupta, P., Lin, J.: Information network or social network? The structure of the twitter follow graph. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 493\u2013498. ACM (2014)","DOI":"10.1145\/2567948.2576939"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Ou, M., Cui, P., Pei, J., Zhang, Z., Zhu, W.: Asymmetric transitivity preserving graph embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1105\u20131114. ACM (2016)","DOI":"10.1145\/2939672.2939751"},{"issue":"1","key":"17_CR29","doi-asserted-by":"publisher","first-page":"2508","DOI":"10.1038\/s41598-018-20546-3","volume":"8","author":"R Paluch","year":"2018","unstructured":"Paluch, R., Lu, X., Suchecki, K., Szyma\u0144ski, B.K., Ho\u0142yst, J.A.: Fast and accurate detection of spread source in large complex networks. Sci. Rep. 8(1), 2508 (2018)","journal-title":"Sci. Rep."},{"issue":"14","key":"17_CR30","doi-asserted-by":"publisher","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","volume":"86","author":"R Pastor-Satorras","year":"2001","unstructured":"Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks. Phys. Rev. Lett. 86(14), 3200 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"11","key":"17_CR31","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K Pearson","year":"1901","unstructured":"Pearson, K.: LIII. On lines and planes of closest fit to systems of points in space. Lond. Edinb. Dublin Philos. Mag. J. Sci. 2(11), 559\u2013572 (1901)","journal-title":"Lond. Edinb. Dublin Philos. Mag. J. Sci."},{"key":"17_CR32","doi-asserted-by":"publisher","unstructured":"Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: online learning of social representations. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2014, pp. 701\u2013710 (2014). https:\/\/doi.org\/10.1145\/2623330.2623732","DOI":"10.1145\/2623330.2623732"},{"issue":"3","key":"17_CR33","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1177\/0002764217708585","volume":"62","author":"F S\u00e1ez-Mateu","year":"2018","unstructured":"S\u00e1ez-Mateu, F.: Democracy, screens, identity, and social networks: the case of Donald Trump\u2019s election. Am. Behav. Sci. 62(3), 320\u2013334 (2018)","journal-title":"Am. Behav. Sci."},{"key":"17_CR34","unstructured":"Seth, S.: \\$9 million lost each day in cryptocurrency scams. Investopedia 13 (2018)"},{"key":"17_CR35","doi-asserted-by":"publisher","unstructured":"Shah, D., Zaman, T.: Rumor centrality: a universal source detector. In: Proceedings of the 12th ACM SIGMETRICS\/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2012, pp. 199\u2013210 (2012). https:\/\/doi.org\/10.1145\/2254756.2254782","DOI":"10.1145\/2254756.2254782"},{"key":"17_CR36","unstructured":"Shao, C., Ciampaglia, G.L., Varol, O., Flammini, A., Menczer, F.: The spread of fake news by social bots, pp. 96\u2013104 (2017). arXiv preprint arXiv:1707.07592"},{"key":"17_CR37","doi-asserted-by":"publisher","first-page":"103246","DOI":"10.1016\/j.jbi.2019.103246","volume":"96","author":"F Shen","year":"2019","unstructured":"Shen, F., et al.: HPO2Vec+: leveraging heterogeneous knowledge resources to enrich node embeddings for the human phenotype ontology. J. Biomed. Inform. 96, 103246 (2019). https:\/\/doi.org\/10.1016\/j.jbi.2019.103246","journal-title":"J. Biomed. Inform."},{"key":"17_CR38","series-title":"Lecture Notes in Social Networks","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-94105-9_3","volume-title":"Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining","author":"K Shu","year":"2019","unstructured":"Shu, K., Bernard, H.R., Liu, H.: Studying fake news via network analysis: detection and mitigation. In: Agarwal, N., Dokoohaki, N., Tokdemir, S. (eds.) Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining. LNSN, pp. 43\u201365. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-319-94105-9_3"},{"issue":"1","key":"17_CR39","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newslett. 19(1), 22\u201336 (2017)","journal-title":"ACM SIGKDD Explor. Newslett."},{"key":"17_CR40","unstructured":"Speer, R., Havasi, C., Lieberman, H.: Analogyspace: reducing the dimensionality of common sense knowledge. In: Proceedings of the 23rd National Conference on Artificial Intelligence, AAAI 2008, pp. 548\u2013553 (2008)"},{"key":"17_CR41","doi-asserted-by":"publisher","unstructured":"Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: Line: large-scale information network embedding. In: Proceedings of the 24th International Conference on World Wide Web, WWW 2015, pp. 1067\u20131077 (2015). https:\/\/doi.org\/10.1145\/2736277.2741093","DOI":"10.1145\/2736277.2741093"},{"issue":"3","key":"17_CR42","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s10618-010-0210-x","volume":"23","author":"L Tang","year":"2011","unstructured":"Tang, L., Liu, H.: Leveraging social media networks for classification. Data Min. Knowl. Disc. 23(3), 447\u2013478 (2011)","journal-title":"Data Min. Knowl. Disc."},{"key":"17_CR43","doi-asserted-by":"crossref","unstructured":"Wang, D., Cui, P., Zhu, W.: Structural deep network embedding. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1225\u20131234. ACM (2016)","DOI":"10.1145\/2939672.2939753"},{"issue":"4","key":"17_CR44","doi-asserted-by":"publisher","first-page":"3371","DOI":"10.1007\/s11277-016-3781-z","volume":"94","author":"L Wu","year":"2017","unstructured":"Wu, L., Zhang, Y., Xie, Y., Alelaiw, A., Shen, J.: An efficient and secure identity-based authentication and key agreement protocol with user anonymity for mobile devices. Wirel. Pers. Commun. 94(4), 3371\u20133387 (2017). https:\/\/doi.org\/10.1007\/s11277-016-3781-z","journal-title":"Wirel. Pers. Commun."},{"issue":"12","key":"17_CR45","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/JPROC.2014.2364018","volume":"102","author":"J Yang","year":"2014","unstructured":"Yang, J., Leskovec, J.: Overlapping communities explain core-periphery organization of networks. Proc. IEEE 102(12), 1892\u20131902 (2014)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36987-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T13:56:39Z","timestamp":1722261399000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36987-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"ISBN":["9783030369866","9783030369873"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36987-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"9 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDCIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Distributed Computing and Internet Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneswar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdcit0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icdcit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"110","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"In addition, there are 6 invited papers.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}