{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:37:33Z","timestamp":1769751453107,"version":"3.49.0"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030869786","type":"print"},{"value":"9783030869793","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86979-3_37","type":"book-chapter","created":{"date-parts":[[2021,9,11]],"date-time":"2021-09-11T18:02:18Z","timestamp":1631383338000},"page":"523-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Deep Fake Recognition in Tweets Using Text Augmentation, Word Embeddings and Deep Learning"],"prefix":"10.1007","author":[{"given":"Senait G.","family":"Tesfagergish","sequence":"first","affiliation":[]},{"given":"Robertas","family":"Dama\u0161evi\u010dius","sequence":"additional","affiliation":[]},{"given":"Jurgita","family":"Kapo\u010di\u016bt\u0117-Dzikien\u0117","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,12]]},"reference":[{"issue":"4","key":"37_CR1","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1080\/10357718.2020.1734772","volume":"74","author":"T Paterson","year":"2020","unstructured":"Paterson, T., Hanley, L.: Political warfare in the digital age: cyber subversion, information operations and \u2018deep fakes.\u2019 Aust. J. Int. Aff. 74(4), 439\u2013454 (2020)","journal-title":"Aust. J. Int. Aff."},{"issue":"2","key":"37_CR2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1080\/21670811.2017.1360143","volume":"6","author":"EC Tandoc","year":"2018","unstructured":"Tandoc, E.C., Lim, Z.W., Ling, R.: Defining \u201cFake news\u201d: a typology of scholarly definitions. Digit. Journal. 6(2), 137\u2013153 (2018)","journal-title":"Digit. Journal."},{"issue":"1","key":"37_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1177\/0894439317734157","volume":"37","author":"MT Bastos","year":"2019","unstructured":"Bastos, M.T., Mercea, D.: The brexit botnet and user-generated hyperpartisan news. Soc. Sci. Comput. Rev. 37(1), 38\u201354 (2019)","journal-title":"Soc. Sci. Comput. Rev."},{"key":"37_CR4","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-981-13-9364-8_22","volume-title":"Data Management, Analytics and Innovation","author":"PA Assibong","year":"2020","unstructured":"Assibong, P.A., Wogu, I.A.P., Sholarin, M.A., Misra, S., Damasevi\u010dius, R., Sharma, N.: The politics of artificial intelligence behaviour and human rights violation issues in the 2016 US presidential elections: An appraisal. In: Sharma, N., Chakrabarti, A., Balas, V.E. (eds.) Data Management, Analytics and Innovation. AISC, vol. 1016, pp. 295\u2013309. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-9364-8_22"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Wang, Y., McKee, M., Torbica, A., Stuckler, D.: Systematic literature review on the spread of health-related misinformation on social media. Soc. Sci. Med. 240, 112552 (2019)","DOI":"10.1016\/j.socscimed.2019.112552"},{"issue":"10225","key":"37_CR6","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/S0140-6736(20)30357-3","volume":"395","author":"K Shimizu","year":"2020","unstructured":"Shimizu, K.: 2019-nCoV, fake news, and racism. Lancet 395(10225), 685\u2013686 (2020)","journal-title":"Lancet"},{"issue":"7","key":"37_CR7","doi-asserted-by":"publisher","first-page":"2221","DOI":"10.3390\/app10072221","volume":"10","author":"J Kapo\u010diute-Dzikiene","year":"2020","unstructured":"Kapo\u010diute-Dzikiene, J.: A domain-specific generative chatbot trained from little data. Appl. Sci. 10(7), 2221 (2020)","journal-title":"Appl. Sci."},{"key":"37_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-64471-4_34","volume-title":"Database and Expert Systems Applications","author":"A Dandekar","year":"2017","unstructured":"Dandekar, A., Zen, R.A.M., Bressan, S.: Generating fake but realistic headlines using deep neural networks. In: Benslimane, D., Damiani, E., Grosky, W.I., Hameurlain, A., Sheth, A., Wagner, R.R. (eds.) DEXA 2017. LNCS, vol. 10439, pp. 427\u2013440. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64471-4_34"},{"key":"37_CR9","first-page":"9","volume":"2016","author":"A Chakraborty","year":"2016","unstructured":"Chakraborty, A., Paranjape, B., Kakarla, S., Ganguly, N.: Stop clickbait: detecting and preventing clickbaits in online news media. IEEE\/ACM Int. Conf. Adv. Soc. Netw. Anal. Mining, ASONAM 2016, 9\u201316 (2016)","journal-title":"IEEE\/ACM Int. Conf. Adv. Soc. Netw. Anal. Mining, ASONAM"},{"issue":"2","key":"37_CR10","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s10603-012-9216-7","volume":"36","author":"J Malbon","year":"2013","unstructured":"Malbon, J.: Taking fake online consumer reviews seriously. J. Consumer Policy 36(2), 139\u2013157 (2013)","journal-title":"J. Consumer Policy"},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"40416","DOI":"10.1109\/ACCESS.2019.2897586","volume":"7","author":"Z Ji","year":"2019","unstructured":"Ji, Z., Pi, H., Wei, W., Xiong, B., Wozniak, M., Damasevicius, R.: Recommendation based on review texts and social communities: a hybrid model. Access 7, 40416\u201340427 (2019)","journal-title":"Access"},{"issue":"21","key":"37_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/app10217426","volume":"10","author":"J Kapo\u010di\u016bt\u0117-Dzikien\u0117","year":"2020","unstructured":"Kapo\u010di\u016bt\u0117-Dzikien\u0117, J., Balodis, K., Skadi\u0146\u0161, R.: Intent detection problem solving via automatic DNN hyperparameter optimization. Appl. Sci. 10(21), 1\u201321 (2020)","journal-title":"Appl. Sci."},{"key":"37_CR13","doi-asserted-by":"publisher","first-page":"107275","DOI":"10.1016\/j.comnet.2020.107275","volume":"178","author":"W Wei","year":"2020","unstructured":"Wei, W., Ke, Q., Nowak, J., Korytkowski, M., Scherer, R., Wo\u017aniak, M.: Accurate and fast URL phishing detector: a convolutional neural network approach. Comput. Netw. 178, 107275 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107275","journal-title":"Comput. Netw."},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, B., Wei, W., Wang, W., Li, Y., Cui, H., Si, Q.: Modeling topic propagation on heterogeneous online social networks. In: 2018 IEEE 18th International Conference on Software Quality, Reliability, and Security Companion, QRS-C 2018, pp. 641\u2013642 (2018)","DOI":"10.1109\/QRS-C.2018.00114"},{"key":"37_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-030-62005-9_33","volume-title":"Web Information Systems Engineering \u2013 WISE 2020","author":"J Lin","year":"2020","unstructured":"Lin, J., et al.: Attention-based high-order feature interactions to enhance the recommender system for web-based knowledge-sharing service. In: Huang, Z., Beek, W., Wang, H., Zhou, R., Zhang, Y. (eds.) WISE 2020. LNCS, vol. 12342, pp. 461\u2013473. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62005-9_33"},{"key":"37_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8839524","volume":"2020","author":"NAI Omoregbe","year":"2020","unstructured":"Omoregbe, N.A.I., Ndaman, I.O., Misra, S., Abayomi-Alli, O.O., Dama\u0161evi\u010dius, R.: text messaging-based medical diagnosis using natural language processing and fuzzy logic. J. Healthcare Eng. 2020, 1\u201314 (2020)","journal-title":"J. Healthcare Eng."},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Li, C., Su, Y., Liu, W.: Text-to-text generative adversarial networks. International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, Brazil, pp. 1\u20137 (2018)","DOI":"10.1109\/IJCNN.2018.8489624"},{"key":"37_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-319-95171-3_18","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2018","author":"IA Wogu","year":"2018","unstructured":"Wogu, I.A., Misra, S., Assibong, P., Adewumi, A., Damasevicius, R., Maskeliunas, R.: A critical review of the politics of artificial intelligent machines, alienation and the existential risk threat to America\u2019s labour force. In: Gervasi, O., et al. (eds.) ICCSA 2018. LNCS, vol. 10963, pp. 217\u2013232. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95171-3_18"},{"key":"37_CR19","doi-asserted-by":"crossref","unstructured":"Wogu, I.A.P., Misra, S., Roland-Otaru, C.O., Udoh, O.D., Awogu-Maduagwu, E., Damasevicius, R.: Human rights\u2019 issues and media\/communication theories in the wake of artificial intelligence technologies: The fate of electorates in twenty-first-century american politics. In: Advances in Electrical and Computer Technologies, pp. 319-333 (2020)","DOI":"10.1007\/978-981-15-5558-9_30"},{"issue":"6380","key":"37_CR20","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1126\/science.aao2998","volume":"359","author":"DMJ Lazer","year":"2018","unstructured":"Lazer, D.M.J., et al.: The science of fake news: addressing fake news requires a multidisciplinary effort. Science 359(6380), 1094\u20131096 (2018)","journal-title":"Science"},{"issue":"2","key":"37_CR21","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIS.2019.2899143","volume":"34","author":"JCS Reis","year":"2019","unstructured":"Reis, J.C.S., Correia, A., Murai, F., Veloso, A., Benevenuto, F., Cambria, E.: Supervised learning for fake news detection. IEEE Intell. Syst. 34(2), 76\u201381 (2019)","journal-title":"IEEE Intell. Syst."},{"key":"37_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.ins.2019.05.035","volume":"497","author":"A Bondielli","year":"2019","unstructured":"Bondielli, A., Marcelloni, F.: A survey on fake news and rumour detection techniques. Inf. Sci. 497, 38\u201355 (2019)","journal-title":"Inf. Sci."},{"key":"37_CR23","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.ins.2017.01.015","volume":"385","author":"Y Ren","year":"2017","unstructured":"Ren, Y., Ji, D.: Neural networks for deceptive opinion spam detection: an empirical study. Inf. Sci. 385, 213\u2013224 (2017)","journal-title":"Inf. Sci."},{"issue":"23","key":"37_CR24","doi-asserted-by":"publisher","first-page":"17259","DOI":"10.1007\/s00521-020-04757-2","volume":"32","author":"P Hajek","year":"2020","unstructured":"Hajek, P., Barushka, A., Munk, M.: Fake consumer review detection using deep neural networks integrating word embeddings and emotion mining. Neural Comput. Appl. 32(23), 17259\u201317274 (2020). https:\/\/doi.org\/10.1007\/s00521-020-04757-2","journal-title":"Neural Comput. Appl."},{"key":"37_CR25","doi-asserted-by":"crossref","unstructured":"Zheng, H., Chen, J., Yao, X., Sangaiah, A.K., Jiang, Y., Zhao, C.: Clickbait convolutional neural network. Symmetry 10(5), 138 (2018)","DOI":"10.3390\/sym10050138"},{"key":"37_CR26","doi-asserted-by":"crossref","unstructured":"Ajao, O., Bhowmik, D., Zargari, S.: Fake news identification on twitter with hybrid CNN and rnn models. In: 9th International Conference on Social Media and Society, pp. 226\u2013230 (2018)","DOI":"10.1145\/3217804.3217917"},{"issue":"4","key":"37_CR27","doi-asserted-by":"publisher","first-page":"4315","DOI":"10.1007\/s12652-019-01527-4","volume":"12","author":"MZ Asghar","year":"2019","unstructured":"Asghar, M.Z., Habib, A., Habib, A., Khan, A., Ali, R., Khattak, A.: Exploring deep neural networks for rumor detection. J. Ambient. Intell. Humaniz. Comput. 12(4), 4315\u20134333 (2019). https:\/\/doi.org\/10.1007\/s12652-019-01527-4","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"37_CR28","doi-asserted-by":"crossref","unstructured":"Fang, Y., Gao, J., Huang, C., Peng, H., Wu, R.: Self multi-head attention-based convolutional neural networks for fake news detection. PLoS ONE 14(9), e0222713 (2019)","DOI":"10.1371\/journal.pone.0222713"},{"issue":"2","key":"37_CR29","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/3381750","volume":"20","author":"B Ghanem","year":"2020","unstructured":"Ghanem, B., Rosso, P., Rangel, F.: An emotional analysis of false information in social media and news articles. ACM Trans. Internet Technol. 20(2), 19 (2020)","journal-title":"ACM Trans. Internet Technol."},{"issue":"19","key":"37_CR30","doi-asserted-by":"publisher","first-page":"4062","DOI":"10.3390\/app9194062","volume":"9","author":"H Jwa","year":"2019","unstructured":"Jwa, H., Oh, D., Park, K., Kang, J.M., Lim, H.: exBAKE: Automatic fake news detection model based on bidirectional encoder representations from transformers (BERT). Appl. Sci. 9(19), 4062 (2019)","journal-title":"Appl. Sci."},{"key":"37_CR31","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.cogsys.2019.12.005","volume":"61","author":"RK Kaliyar","year":"2020","unstructured":"Kaliyar, R.K., Goswami, A., Narang, P., Sinha, S.: FNDNet \u2013 A deep convolutional neural network for fake news detection. Cogn. Syst. Res. 61, 32\u201344 (2020)","journal-title":"Cogn. Syst. Res."},{"issue":"3","key":"37_CR32","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/3386253","volume":"38","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Wu, Y.B.: FNED: A deep network for fake news early detection on social media. ACM Trans. Inf. Syst. 38(3), 25 (2020)","journal-title":"ACM Trans. Inf. Syst."},{"key":"37_CR33","doi-asserted-by":"publisher","first-page":"156695","DOI":"10.1109\/ACCESS.2020.3019735","volume":"8","author":"M Umer","year":"2020","unstructured":"Umer, M., Imtiaz, Z., Ullah, S., Mehmood, A., Choi, G.S., On, B.: Fake news stance detection using deep learning architecture (CNN-LSTM). Access 8, 156695\u2013156706 (2020)","journal-title":"Access"},{"key":"37_CR34","doi-asserted-by":"crossref","unstructured":"Yao, H., Jia, X., Kumar, V., Li, Z.: Learning with small data. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 3539\u20133540 (2020)","DOI":"10.1145\/3394486.3406466"},{"key":"37_CR35","doi-asserted-by":"crossref","unstructured":"Molina, M.\u00c1., Asencio-Cort\u00e9s, G., Riquelme, J.C., Mart\u00ednez-\u00c1lvarez, F.: A preliminary study on deep transfer learning applied to image classification for small datasets. In: 15th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO 2020), pp. 741\u2013750 (2021)","DOI":"10.1007\/978-3-030-57802-2_71"},{"key":"37_CR36","doi-asserted-by":"crossref","unstructured":"Moreno-Barea, F.J., Jerez, J.M., Franco, L.: Improving classification accuracy using da-ta augmentation on small data sets. Expert Syst. Appl. 161, 113696 (2020)","DOI":"10.1016\/j.eswa.2020.113696"},{"issue":"9-10","key":"37_CR37","doi-asserted-by":"publisher","first-page":"5439","DOI":"10.1007\/s11042-018-5748-4","volume":"79","author":"X Sun","year":"2018","unstructured":"Sun, X., He, J.: A novel approach to generate a large scale of supervised data for short text sentiment analysis. Multimedia Tools Appl. 79(9\u201310), 5439\u20135459 (2018). https:\/\/doi.org\/10.1007\/s11042-018-5748-4","journal-title":"Multimedia Tools Appl."},{"issue":"11","key":"37_CR38","doi-asserted-by":"publisher","first-page":"1393","DOI":"10.3390\/sym11111393","volume":"11","author":"D Park","year":"2019","unstructured":"Park, D., Ahn, C.W.: Self-supervised contextual data augmentation for natural language processing. Symmetry 11(11), 1393 (2019)","journal-title":"Symmetry"},{"key":"37_CR39","doi-asserted-by":"crossref","unstructured":"Fadaee, M., Bisazza, A., Monz, C.: Data augmentation for low-resource neural machine translation. arXiv:1705.00440 (2017)","DOI":"10.18653\/v1\/P17-2090"},{"key":"37_CR40","unstructured":"Xie, Z., Wang, S.I., Li, J., L\u00e9vy, D., Nie, A., Jurafsky, D., Ng, A.Y.: Data noising as smoothing in neural network language models. arXiv:1703.02573 (2017)"},{"key":"37_CR41","doi-asserted-by":"crossref","unstructured":"Kobayashi, S.: Contextual augmentation: Data augmentation by words with paradigmatic relations. arXiv:1805.06201 (2018)","DOI":"10.18653\/v1\/N18-2072"},{"key":"37_CR42","doi-asserted-by":"crossref","unstructured":"Gao, F., et al.: Soft contextual data augmentation for neural machine translation. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp. 5539\u20135544 (2019).","DOI":"10.18653\/v1\/P19-1555"},{"key":"37_CR43","doi-asserted-by":"crossref","unstructured":"Fagni, T., Falchi, F., Gambini, M., Martella, A., Tesconi, M.: TweepFake: About detecting deepfake tweets. PLOS ONE 16(5), e0251415 (2021)","DOI":"10.1371\/journal.pone.0251415"},{"issue":"1\u20132","key":"37_CR44","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/378881.378888","volume":"24","author":"C Fox","year":"1989","unstructured":"Fox, C.: A stop list for general text. ACM SIGIR forum 24(1\u20132), 19\u201321 (1989)","journal-title":"ACM SIGIR forum"},{"key":"37_CR45","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10791-007-9027-7","volume":"10","author":"J Jiang","year":"2007","unstructured":"Jiang, J., Zhai, C.: An empirical study of tokenization strategies for biomedical information retrieval. Inf. Retrieval 10, 341\u2013363 (2007)","journal-title":"Inf. Retrieval"},{"issue":"1","key":"37_CR46","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1002\/(SICI)1097-4571(199101)42:1<7::AID-ASI2>3.0.CO;2-P","volume":"42","author":"D Harman","year":"1991","unstructured":"Harman, D.: How effective is suffixing? J. Am. Soc. Inf. Sci. 42(1), 7\u201315 (1991)","journal-title":"J. Am. Soc. Inf. Sci."},{"issue":"5","key":"37_CR47","doi-asserted-by":"publisher","first-page":"255","DOI":"10.3390\/info11050255","volume":"11","author":"Y Li","year":"2020","unstructured":"Li, Y., Li, X., Yang, Y., Dong, R.: A diverse data augmentation strategy for low-resource neural machine translation. Information 11(5), 255 (2020)","journal-title":"Information"},{"key":"37_CR48","doi-asserted-by":"crossref","unstructured":"Wei, J.W., Zou, K.: EDA: Easy data augmentation techniques for boosting performance on text classification tasks. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp. 6382\u20136388 (2019)","DOI":"10.18653\/v1\/D19-1670"},{"issue":"23","key":"37_CR49","doi-asserted-by":"publisher","first-page":"6793","DOI":"10.3390\/s20236793","volume":"20","author":"IM Nasir","year":"2020","unstructured":"Nasir, I.M., et al.: Pearson correlation-based feature selection for document classification using balanced training. Sensors 20(23), 6793 (2020)","journal-title":"Sensors"},{"key":"37_CR50","doi-asserted-by":"crossref","unstructured":"Pennington, J., Socher, R., Manning, C.: Glove: global vectors for word representation. Conference on Empirical Methods in Natural Language Processing, pp. 1532\u20131543 (2014)","DOI":"10.3115\/v1\/D14-1162"},{"key":"37_CR51","unstructured":"Liu, Y., et al.: RoBERTa: A Robustly Optimized BERT Pretraining Approach. arXiv:1907.11692 (2019)"},{"key":"37_CR52","doi-asserted-by":"crossref","unstructured":"Cho, K., et al.: Learning Phrase Representations using RNN Encoder-Decoder for Statistical Machine Translation. arXiv:1406.1078 (2014)","DOI":"10.3115\/v1\/D14-1179"},{"issue":"8","key":"37_CR53","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"37_CR54","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. arXiv:1409.0473 (2014)."},{"key":"37_CR55","doi-asserted-by":"publisher","first-page":"10090","DOI":"10.3390\/su122310090","volume":"12","author":"MG Ragab","year":"2020","unstructured":"Ragab, M.G., et al.: A novel one-dimensional cnn with exponential adaptive gradients for air pollution index prediction. Sustainability 12, 10090 (2020)","journal-title":"Sustainability"},{"key":"37_CR56","unstructured":"Akbik, A., Bergmann, T., Blythe, D., Rasul, K., Schweter, S., Vollgraf, R.: FLAIR: an Easy-to-Use Framework for State-of-the-Art NLP. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019, pp. 54\u201359 (2019)"},{"key":"37_CR57","doi-asserted-by":"crossref","unstructured":"Bergstra, J., Komer, B., Eliasmith, C., Yamins, D., Cox, D.D.: Hyperopt: a python library for model selection and hyperparameter optimization. Comput. Sci. Discov. 8(1), 014008 (2015)","DOI":"10.1088\/1749-4699\/8\/1\/014008"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86979-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T17:43:43Z","timestamp":1699465423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86979-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030869786","9783030869793"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86979-3_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"12 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}