{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:47Z","timestamp":1767339947229,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030504229"},{"type":"electronic","value":"9783030504236"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50423-6_49","type":"book-chapter","created":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T10:03:01Z","timestamp":1592560981000},"page":"653-666","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Sentiment Analysis for Fake News Detection by Means of Neural Networks"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Kula","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Pawe\u0142","family":"Ksieniewicz","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Wo\u017aniak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"49_CR1","volume-title":"The Sun and the Moon: The Remarkable True Account of Hoaxers, Showmen, Dueling Journalists, and Lunar Man-Bats in Nineteenth-Century New York","author":"M Goodman","year":"2008","unstructured":"Goodman, M.: The Sun and the Moon: The Remarkable True Account of Hoaxers, Showmen, Dueling Journalists, and Lunar Man-Bats in Nineteenth-Century New York. Basic Books, New York (2008)"},{"doi-asserted-by":"crossref","unstructured":"Jain, A., Kasbe, A.: Fake News Detection. In: 2018 IEEE International Students\u2019 Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, pp. 1\u20135 (2018)","key":"49_CR2","DOI":"10.1109\/SCEECS.2018.8546944"},{"unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. CoRR, abs\/1708.01967 (2017)","key":"49_CR3"},{"key":"49_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-319-99954-8_12","volume-title":"Computer Information Systems and Industrial Management","author":"M Chora\u015b","year":"2018","unstructured":"Chora\u015b, M., Gie\u0142czyk, A., Demestichas, K., Puchalski, D., Kozik, R.: Pattern recognition solutions for fake news detection. In: Saeed, K., Homenda, W. (eds.) CISIM 2018. LNCS, vol. 11127, pp. 130\u2013139. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99954-8_12"},{"unstructured":"Zhang, J., Cui, L., Fu, Y., Gouza, F.B.: Fake news detection with deep diffusive network model. CoRR, abs\/1805.08751 (2018)","key":"49_CR5"},{"unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)","key":"49_CR6"},{"unstructured":"Akbik, A., Bergmann, T., Blythe, D., Rasul, K., Schweter, S., Vollgraf, R.: FLAIR: an easy-to-use framework for state-of-the-art NLP. In: Ammar, W., Louis, A., Mostafazadeh, N. (eds.) NAACL-HLT (Demonstrations), pp. 54\u201359. Association for Computational Linguistics (2019)","key":"49_CR7"},{"doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.D.: GloVe: global vectors for word representation. In: Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014)","key":"49_CR8","DOI":"10.3115\/v1\/D14-1162"},{"doi-asserted-by":"crossref","unstructured":"Joulin, A., Grave, E., Bojanowski, P., Mikolov, T.: Bag of Tricks for efficient text classification. In: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 2, Short Papers, pp. 427\u2013431 (2017)","key":"49_CR9","DOI":"10.18653\/v1\/E17-2068"},{"key":"49_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. Trans. Assoc. Comput. Linguist. 5, 135\u2013146 (2017)","journal-title":"Trans. Assoc. Comput. Linguist."},{"doi-asserted-by":"crossref","unstructured":"Yang, Z., Yang, D., Dyer, C., He, X., Smola, A.J., Hovy, E.H.: Hierarchical attention networks for document classification. In: Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 1480\u20131489 (2016)","key":"49_CR11","DOI":"10.18653\/v1\/N16-1174"},{"unstructured":"Chung, J., G\u00fclcehre, C., Cho, K., Bengio, Y.: Empirical evaluation of gated recurrent neural networks on sequence modeling. In: NIPS 2014 Workshop on Deep Learning and Representation Learning, Montr\u00e9al, Canada (2014)","key":"49_CR12"},{"key":"49_CR13","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"issue":"1","key":"49_CR14","doi-asserted-by":"publisher","first-page":"e9","DOI":"10.1002\/spy2.9","volume":"1","author":"H Ahmed","year":"2018","unstructured":"Ahmed, H., Traore, I., Saad, S.: Detecting opinion spams and fake news using text classification. J. Secur. Priv. 1(1), e9 (2018)","journal-title":"J. Secur. Priv."},{"unstructured":"Getting real about fake news. https:\/\/www.kaggle.com\/mrisdal\/fake-news. Accessed 25 Nov 2019","key":"49_CR15"},{"doi-asserted-by":"publisher","unstructured":"Ahmed, H., Traor\u00e9, I., Saad, S.: Detection of online fake news using N-gram analysis and machine learning techniques. In: Traor\u00e9, I., Woungang, I., Awad, A. (eds.) ISDDC 2017. LNCS, vol. 10618, pp. 127\u2013138. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69155-8_9","key":"49_CR16","DOI":"10.1007\/978-3-319-69155-8_9"},{"unstructured":"The Independent webpage. https:\/\/www.independent.co.uk\/news\/world\/middle-east\/raqqa-isis-terror-fears-europe-a7401511.html. Accessed 28 Dec 2019","key":"49_CR17"},{"unstructured":"11 Sci-Fi Short Stories, the Janitor in Space - American Short Fiction website. http:\/\/americanshortfiction.org\/2014\/07\/01\/janitor-space\/. Accessed 28 Dec 2019","key":"49_CR18"},{"key":"49_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-030-33617-2_34","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2019","author":"P Ksieniewicz","year":"2019","unstructured":"Ksieniewicz, P., Chora\u015b, M., Kozik, R., Wo\u017aniak, M.: Machine learning methods for fake news classification. In: Yin, H., Camacho, D., Tino, P., Tall\u00f3n-Ballesteros, A.J., Menezes, R., Allmendinger, R. (eds.) IDEAL 2019. LNCS, vol. 11872, pp. 332\u2013339. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33617-2_34"},{"doi-asserted-by":"crossref","unstructured":"Chora\u015b, M., Pawlicki, M., Kozik, R., Demestichas, K.P., Kosmides, P., Gupta, M.: SocialTruth project approach to online disinformation (fake news) detection and mitigation. In: Proceedings of ARES, Canterbury, UK, pp. 68:1\u201368:10 (2019)","key":"49_CR20","DOI":"10.1145\/3339252.3341497"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50423-6_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T23:17:39Z","timestamp":1718752659000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50423-6_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030504229","9783030504236"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50423-6_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"248 workshop papers were selected from 489 submissions to the thematic tracks. The conference was canceled due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}