{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:44:58Z","timestamp":1743122698806,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030914332"},{"type":"electronic","value":"9783030914349"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-91434-9_33","type":"book-chapter","created":{"date-parts":[[2021,12,3]],"date-time":"2021-12-03T07:04:42Z","timestamp":1638515082000},"page":"340-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Machine Learning Technique for Fake News Detection Using Text-Based Word Vector Representation"],"prefix":"10.1007","author":[{"given":"Akshat","family":"Gaurav","sequence":"first","affiliation":[]},{"given":"B. B.","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Ching-Hsien","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Arcangelo","family":"Castiglione","sequence":"additional","affiliation":[]},{"given":"Kwok Tai","family":"Chui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,4]]},"reference":[{"issue":"1","key":"33_CR1","doi-asserted-by":"publisher","first-page":"116","DOI":"10.4018\/IJSWIS.2020010106","volume":"16","author":"JR Alharbi","year":"2020","unstructured":"Alharbi, J.R., Alhalabi, W.S.: Hybrid approach for sentiment analysis of twitter posts using a dictionary-based approach and fuzzy logic methods: study case on cloud service providers. Int. J. Semant. Web Inf. Syst. (IJSWIS) 16(1), 116\u2013145 (2020)","journal-title":"Int. J. Semant. Web Inf. Syst. (IJSWIS)"},{"key":"33_CR2","doi-asserted-by":"publisher","unstructured":"Bahad, P., Saxena, P., Kamal, R.: Fake news detection using bi-directional LSTM-recurrent neural network. Procedia Comput. Sci. 165, 74\u201382 (2019). https:\/\/doi.org\/10.1016\/j.procs.2020.01.072. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050920300806","DOI":"10.1016\/j.procs.2020.01.072"},{"issue":"3","key":"33_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.2021070101","volume":"13","author":"HA Bouarara","year":"2021","unstructured":"Bouarara, H.A.: Recurrent neural network (RNN) to analyse mental behaviour in social media. Int. J. Softw. Sci. Comput. Intell. (IJSSCI) 13(3), 1\u201311 (2021)","journal-title":"Int. J. Softw. Sci. Comput. Intell. (IJSSCI)"},{"key":"33_CR4","unstructured":"Kaggle Dataset: Fake and real news dataset. https:\/\/kaggle.com\/clmentbisaillon\/fake-and-real-news-dataset"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-030-66046-8_32","volume-title":"Computational Data and Social Networks","author":"A Gaurav","year":"2020","unstructured":"Gaurav, A., Gupta, B.B., Castiglione, A., Psannis, K., Choi, C.: A novel approach for fake news detection in vehicular ad-hoc network (VANET). In: Chellappan, S., Choo, K.-K.R., Phan, N.H. (eds.) CSoNet 2020. LNCS, vol. 12575, pp. 386\u2013397. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66046-8_32"},{"key":"33_CR6","first-page":"908","volume":"33","author":"A Gaurav","year":"2021","unstructured":"Gaurav, A., Singh, A.K.: Light weight approach for secure backbone construction for MANETs. J. King Saud Univ. Comput. Inf. Sci. 33, 908\u2013919 (2021)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"2\u20133","key":"33_CR7","first-page":"170","volume":"10","author":"S Gupta","year":"2018","unstructured":"Gupta, S., Gupta, B.B.: Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks. Int. J. Inf. Comput. Secur. 10(2\u20133), 170\u2013200 (2018)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-030-36987-3_17","volume-title":"Distributed Computing and Internet Technology","author":"T Hamdi","year":"2020","unstructured":"Hamdi, T., Slimi, H., Bounhas, I., Slimani, Y.: A hybrid approach for fake news detection in twitter based on user features and graph embedding. In: Hung, D.V., D\u2019Souza, M. (eds.) ICDCIT 2020. LNCS, vol. 11969, pp. 266\u2013280. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-36987-3_17"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-319-44748-3_17","volume-title":"Artificial Intelligence: Methodology, Systems, and Applications","author":"M Hardalov","year":"2016","unstructured":"Hardalov, M., Koychev, I., Nakov, P.: In search of credible news. In: Dichev, C., Agre, G. (eds.) AIMSA 2016. LNCS (LNAI), vol. 9883, pp. 172\u2013180. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44748-3_17"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"22626","DOI":"10.1109\/ACCESS.2021.3056079","volume":"9","author":"T Jiang","year":"2021","unstructured":"Jiang, T., Li, J.P., Haq, A.U., Saboor, A., Ali, A.: A novel stacking approach for accurate detection of fake news. IEEE Access 9, 22626\u201322639 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3056079","journal-title":"IEEE Access"},{"key":"33_CR11","doi-asserted-by":"publisher","unstructured":"Nasir, J.A., Khan, O.S., Varlamis, I.: Fake news detection: a hybrid CNN-RNN based deep learning approach. Int. J. Inf. Manag. Data Insights 1(1), 100007 (2021). https:\/\/doi.org\/10.1016\/j.jjimei.2020.100007. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2667096820300070","DOI":"10.1016\/j.jjimei.2020.100007"},{"issue":"3","key":"33_CR12","doi-asserted-by":"publisher","first-page":"88","DOI":"10.4018\/IJSWIS.2020070106","volume":"16","author":"S Noor","year":"2020","unstructured":"Noor, S., Guo, Y., Shah, S.H.H., Nawaz, M.S., Butt, A.S.: Research synthesis and thematic analysis of twitter through bibliometric analysis. Int. J. Semant. Web Inf. Syst. (IJSWIS) 16(3), 88\u2013109 (2020)","journal-title":"Int. J. Semant. Web Inf. Syst. (IJSWIS)"},{"key":"33_CR13","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/LSP.2020.3008087","volume":"27","author":"NR de Oliveira","year":"2020","unstructured":"de Oliveira, N.R., Medeiros, D.S.V., Mattos, D.M.F.: A sensitive stylistic approach to identify fake news on social networking. IEEE Signal Process. Lett. 27, 1250\u20131254 (2020). https:\/\/doi.org\/10.1109\/LSP.2020.3008087","journal-title":"IEEE Signal Process. Lett."},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"123174","DOI":"10.1016\/j.physa.2019.123174","volume":"540","author":"FA Ozbay","year":"2020","unstructured":"Ozbay, F.A., Alatas, B.: Fake news detection within online social media using supervised artificial intelligence algorithms. Phys. A Stat. Mech. Appl. 540, 123174 (2020)","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"33_CR15","doi-asserted-by":"publisher","unstructured":"Deepak, S., Chitturi, B.: Deep neural approach to fake-news identification. Procedia Comput. Sci. 167, 2236\u20132243 (2020). https:\/\/doi.org\/10.1016\/j.procs.2020.03.276. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050920307420","DOI":"10.1016\/j.procs.2020.03.276"},{"key":"33_CR16","doi-asserted-by":"publisher","unstructured":"Sahoo, S.R., Gupta, B.B.: Multiple features based approach for automatic fake news detection on social networks using deep learning. Appl. Soft Comput. 100, 106983 (2021). https:\/\/doi.org\/10.1016\/j.asoc.2020.106983. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1568494620309224","DOI":"10.1016\/j.asoc.2020.106983"},{"issue":"5","key":"33_CR17","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1109\/TCSS.2020.3014135","volume":"7","author":"G Shrivastava","year":"2020","unstructured":"Shrivastava, G., Kumar, P., Ojha, R.P., Srivastava, P.K., Mohan, S., Srivastava, G.: Defensive modeling of fake news through online social networks. IEEE Trans. Comput. Soc. Syst. 7(5), 1159\u20131167 (2020). https:\/\/doi.org\/10.1109\/TCSS.2020.3014135","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"1","key":"33_CR18","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu, K., Sliva, A., Wang, S., Tang, J., Liu, H.: Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor. Newsl. 19(1), 22\u201336 (2017)","journal-title":"ACM SIGKDD Explor. Newsl."},{"issue":"4","key":"33_CR19","doi-asserted-by":"publisher","first-page":"69","DOI":"10.4018\/IJSWIS.2019100105","volume":"15","author":"S Srinivasan","year":"2019","unstructured":"Srinivasan, S., Dhinesh Babu, L.D.: A parallel neural network approach for faster rumor identification in online social networks. Int. J. Semant. Web Inf. Syst. (IJSWIS) 15(4), 69\u201389 (2019)","journal-title":"Int. J. Semant. Web Inf. Syst. (IJSWIS)"},{"issue":"6380","key":"33_CR20","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science 359(6380), 1146\u20131151 (2018)","journal-title":"Science"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Wang, W.Y.: \u201cLiar, liar pants on fire\u201d: a new benchmark dataset for fake news detection. arXiv preprint arXiv:1705.00648 (2017)","DOI":"10.18653\/v1\/P17-2067"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Wu, L., Liu, H.: Tracing fake-news footprints: characterizing social media messages by how they propagate. In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, pp. 637\u2013645 (2018)","DOI":"10.1145\/3159652.3159677"},{"issue":"2","key":"33_CR23","first-page":"17","volume":"11","author":"L Zhang","year":"2021","unstructured":"Zhang, L., Zhang, Z., Zhao, T.: A novel spatio-temporal access control model for online social networks and visual verification. Int. J. Cloud Appl. Comput. (IJCAC) 11(2), 17\u201331 (2021)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"issue":"2","key":"33_CR24","doi-asserted-by":"publisher","first-page":"102025","DOI":"10.1016\/j.ipm.2019.03.004","volume":"57","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Ghorbani, A.A.: An overview of online fake news: characterization, detection, and discussion. Inf. Process. Manag. 57(2), 102025 (2020)","journal-title":"Inf. Process. Manag."},{"issue":"18","key":"33_CR25","doi-asserted-by":"publisher","first-page":"18513","DOI":"10.1007\/s11042-016-4162-z","volume":"76","author":"Z Zhang","year":"2017","unstructured":"Zhang, Z., Sun, R., Zhao, C., Wang, J., Chang, C.K., Gupta, B.B.: CyVOD: a novel trinity multimedia social network scheme. Multimedia Tools Appl. 76(18), 18513\u201318529 (2017)","journal-title":"Multimedia Tools Appl."},{"issue":"4","key":"33_CR26","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1504\/IJHPCN.2019.099264","volume":"13","author":"J Zhao","year":"2019","unstructured":"Zhao, J., Wang, H.: Detecting fake reviews via dynamic multimode network. Int. J. High Perform. Comput. Netw. 13(4), 408\u2013416 (2019)","journal-title":"Int. J. High Perform. Comput. Netw."},{"issue":"5","key":"33_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3395046","volume":"53","author":"X Zhou","year":"2020","unstructured":"Zhou, X., Zafarani, R.: A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput. Surv. (CSUR) 53(5), 1\u201340 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"33_CR28","doi-asserted-by":"publisher","unstructured":"Zhou, Z., Gaurav, A., Gupta, B., Hamdi, H., Nedjah, N.: A statistical approach to secure health care services from DDoS attacks during COVID-19 pandemic. Neural Comput. Appl. 1\u201314 (2021). https:\/\/doi.org\/10.1007\/s00521-021-06389-6","DOI":"10.1007\/s00521-021-06389-6"},{"key":"33_CR29","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Gaurav, A., Gupta, B.B., Lytras, M.D., Razzak, I.: A fine-grained access control and security approach for intelligent vehicular transport in 6g communication system. IEEE Trans. Intell. Transp. Syst. (2021)","DOI":"10.1109\/TITS.2021.3106825"}],"container-title":["Lecture Notes in Computer Science","Computational Data and Social Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-91434-9_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:44:16Z","timestamp":1710233056000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-91434-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030914332","9783030914349"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-91434-9_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 December 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSoNet","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Data and Social Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"csonet2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/csonet-conf.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}