{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:47:31Z","timestamp":1742914051820,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030615338"},{"type":"electronic","value":"9783030615345"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61534-5_40","type":"book-chapter","created":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T08:04:34Z","timestamp":1603181074000},"page":"445-454","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Supervised Classification Methods for Fake News Identification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6603-392X","authenticated-orcid":false,"given":"Thanh Cong","family":"Truong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4050-648X","authenticated-orcid":false,"given":"Quoc Bao","family":"Diep","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3858-7340","authenticated-orcid":false,"given":"Ivan","family":"Zelinka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5839-4263","authenticated-orcid":false,"given":"Roman","family":"Senkerik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,7]]},"reference":[{"issue":"1","key":"40_CR1","doi-asserted-by":"publisher","first-page":"e9","DOI":"10.1002\/spy2.9","volume":"1","author":"H Ahmed","year":"2018","unstructured":"Ahmed, H., Traore, I., Saad, S.: Detecting opinion spams and fake news using text classification. Secur. Priv. 1(1), e9 (2018)","journal-title":"Secur. Priv."},{"issue":"2","key":"40_CR2","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"H Allcott","year":"2017","unstructured":"Allcott, H., Gentzkow, M.: Social media and fake news in the 2016 election. J. Econ. Perspect. 31(2), 211\u201336 (2017)","journal-title":"J. Econ. Perspect."},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Dadgar, S.M.H., Araghi, M.S., Farahani, M.M.: A novel text mining approach based on TF-IDF and support vector machine for news classification. In: 2016 IEEE International Conference on Engineering and Technology (ICETECH), pp. 112\u2013116. IEEE (2016)","DOI":"10.1109\/ICETECH.2016.7569223"},{"key":"40_CR4","unstructured":"Goldberg, Y., Levy, O.: word2vec explained: deriving Mikolov et al.\u2019s negative-sampling word-embedding method. arXiv preprint \narXiv:1402.3722\n\n (2014)"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Granik, M., Mesyura, V.: Fake news detection using naive bayes classifier. In: 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON), pp. 900\u2013903. IEEE (2017)","DOI":"10.1109\/UKRCON.2017.8100379"},{"key":"40_CR6","unstructured":"Long, Y., Lu, Q., Xiang, R., Li, M., Huang, C.R.: Fake news detection through multi-perspective speaker profiles. In: Proceedings of the Eighth International Joint Conference on Natural Language Processing (Volume 2: Short Papers), pp. 252\u2013256 (2017)"},{"key":"40_CR7","unstructured":"Ramos, J., et al.: Using tf-idf to determine word relevance in document queries. In: Proceedings of the First Instructional Conference on Machine Learning, Piscataway, NJ, vol. 242, pp. 133\u2013142 (2003)"},{"issue":"1","key":"40_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22\u201336 (2017)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"40_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1007\/11941439_114","volume-title":"AI 2006: Advances in Artificial Intelligence","author":"M Sokolova","year":"2006","unstructured":"Sokolova, M., Japkowicz, N., Szpakowicz, S.: Beyond Accuracy, F-score and ROC: a family of discriminant measures for performance evaluation. In: Sattar, A., Kang, B. (eds.) AI 2006. LNCS (LNAI), vol. 4304, pp. 1015\u20131021. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11941439_114"},{"issue":"2","key":"40_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.13164\/mendel.2019.2.027","volume":"25","author":"C Thanh","year":"2019","unstructured":"Thanh, C., Zelinka, I.: A survey on artificial intelligence in malware as next-generation threats. MENDEL 25(2), 27\u201334 (2019). \nhttps:\/\/doi.org\/10.13164\/mendel.2019.2.027","journal-title":"MENDEL"},{"issue":"3","key":"40_CR11","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3390\/sym12030410","volume":"12","author":"TC Truong","year":"2020","unstructured":"Truong, T.C., Diep, Q.B., Zelinka, I.: Artificial intelligence in the cyber domain: offense and defense. Symmetry 12(3), 410 (2020). \nhttps:\/\/doi.org\/10.3390\/sym12030410","journal-title":"Symmetry"},{"key":"40_CR12","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-981-15-0199-9_30","volume-title":"Artificial Intelligence and Evolutionary Computations in Engineering Systems","author":"TC Truong","year":"2020","unstructured":"Truong, T.C., Zelinka, I., Plucar, J., \u010cand\u00edk, M., \u0160ulc, V.: Artificial intelligence and cybersecurity: past, presence, and future. In: Dash, S.S., Lakshmi, C., Das, S., Panigrahi, B.K. (eds.) Artificial Intelligence and Evolutionary Computations in Engineering Systems, pp. 351\u2013363. Springer, Singapore (2020). \nhttps:\/\/doi.org\/10.1007\/978-981-15-0199-9_30"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Wallach, H.M.: Topic modeling: beyond bag-of-words. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 977\u2013984 (2006)","DOI":"10.1145\/1143844.1143967"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Wang, W.Y.: \u201cLiar, Liar pants on fire\u201d: a new benchmark dataset for fake news detection. arXiv preprint \narXiv:1705.00648\n\n (2017)","DOI":"10.18653\/v1\/P17-2067"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61534-5_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T08:34:54Z","timestamp":1603182894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61534-5_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030615338","9783030615345"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61534-5_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Soft Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zakopane","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaisc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisc.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}