{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T12:01:59Z","timestamp":1772798519746,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T00:00:00Z","timestamp":1565222400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T00:00:00Z","timestamp":1565222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s00779-019-01289-y","type":"journal-article","created":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T22:02:28Z","timestamp":1565301748000},"page":"259-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Multi-level word features based on CNN for fake news detection in cultural communication"],"prefix":"10.1007","volume":"24","author":[{"given":"Qingyuan","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0110-451X","authenticated-orcid":false,"given":"Qian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Youshui","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jingxian","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,8]]},"reference":[{"issue":"3","key":"1289_CR1","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/j.dss.2008.11.001","volume":"46","author":"CM Fuller","year":"2009","unstructured":"Fuller CM, Biros DP, Wilson RL (2009) Decision support for determining veracity via linguisticbased cues. Decis Support Syst 46(3):695\u2013703","journal-title":"Decis Support Syst"},{"key":"1289_CR2","doi-asserted-by":"crossref","unstructured":"Morstatter F, Kumar S, Liu H, Maciejewski R (2013) Understanding twitter data with tweetxplorer. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1482\u20131485)","DOI":"10.1145\/2487575.2487703"},{"key":"1289_CR3","unstructured":"Shu K, Mahudeswaran D, Wang S, Lee D, Liu H (2018). Fakenewsnet: A data repository with news content, social context and spatialtemporal information for studying fake news on social media. arXiv preprint arXiv:1809.01286"},{"key":"1289_CR4","doi-asserted-by":"crossref","unstructured":"Shu K, Mahudeswaran D, Liu H (2019). FakeNewsTracker: a tool for fake news collection, detection, and visualization. Computational and Mathematical Organization Theory 25(1):60\u201371","DOI":"10.1007\/s10588-018-09280-3"},{"issue":"2016","key":"1289_CR5","first-page":"243","volume":"7","author":"G Bogaard","year":"2016","unstructured":"Bogaard G, Meijer EH, Vrij A, Merckelbach H (2016) Scientific Content Analysis (SCAN) cannot distinguish between truthful and fabricated accounts of a negative event. Front Psychol 7(2016):243","journal-title":"Front Psychol"},{"issue":"1","key":"1289_CR6","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1037\/h0093965","volume":"36","author":"G Nahari","year":"2012","unstructured":"Nahari G, Vrij A, Fisher RP (2012) Does the truth come out in the writing? Scan as a lie detection tool. Law Human Behavior 36(1):68","journal-title":"Law Human Behavior"},{"key":"1289_CR7","doi-asserted-by":"crossref","unstructured":"Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In Proceedings of the 20th international conference on World Wide Web. ACM, 675\u2013684. 134:A635\u2013A646, Dec. 1965","DOI":"10.1145\/1963405.1963500"},{"key":"1289_CR8","unstructured":"Ott M, Cardie C, Hancock JT (2013) Negative deceptive opinion spam. In HLT-NAACL. 497\u2013501"},{"key":"1289_CR9","unstructured":"Ott M, Choi Y, Cardie C, Hancock JT (2011) Finding deceptive opinion spam by any stretch of the imagination. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1. Association for Computational Linguistics, pp 309\u2013319"},{"key":"1289_CR10","doi-asserted-by":"crossref","unstructured":"Blunsom P, Grefenstette P, Kalchbrenner N (2014) A convolutional neural network for modelling sentences. In: Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics. Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics","DOI":"10.3115\/v1\/P14-1062"},{"key":"1289_CR11","doi-asserted-by":"crossref","unstructured":"Kimura M, Saito K, Motoda H (2009) Efficient estimation of influence functions for SIS model on social networks. In IJCAI. 2046\u20132051","DOI":"10.1007\/978-3-642-04747-3_24"},{"key":"1289_CR12","doi-asserted-by":"crossref","unstructured":"Yih W-t, He X, Meek C (2014) Semantic parsing for single-relation question answering. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). 2:643\u2013648","DOI":"10.3115\/v1\/P14-2105"},{"key":"1289_CR13","doi-asserted-by":"crossref","unstructured":"Kim Y (2014) Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882","DOI":"10.3115\/v1\/D14-1181"},{"key":"1289_CR14","doi-asserted-by":"crossref","unstructured":"Mihalcea R, Strapparava C (2009) The lie detector: explorations in the automatic recognition of deceptive language. In: Proceedings of the ACL-IJCNLP 2009 Conference Short Papers. Association for Computational Linguistics, pp 309\u2013312","DOI":"10.3115\/1667583.1667679"},{"issue":"4","key":"1289_CR15","first-page":"613","volume":"24","author":"M Johnson","year":"1998","unstructured":"Johnson M (1998) PCFG models of linguistic tree representations. Comput Linguist 24(4):613\u2013632","journal-title":"Comput Linguist"},{"issue":"5","key":"1289_CR16","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s00779-016-0941-9","volume":"20","author":"H Dou","year":"2016","unstructured":"Dou H, Qi Y, Wei W, Song H (2016) A two-time-scale load balancing framework for minimizing electricity bills of internet data centers [J]. Pers Ubiquit Comput 20(5):681\u2013693","journal-title":"Pers Ubiquit Comput"},{"key":"1289_CR17","unstructured":"Feng S, Banerjee R, Choi Y (2012) Syntactic stylometry for deception detection. In Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers-Volume 2. Association for Computational Linguistics, pp 171\u2013175"},{"issue":"11","key":"1289_CR18","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Patrick H (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"issue":"6","key":"1289_CR19","doi-asserted-by":"publisher","first-page":"3551","DOI":"10.1109\/TNET.2016.2536626","volume":"24","author":"S Qi","year":"2016","unstructured":"Qi S, Zheng Y, Li M, Liu Y, Qiu J (2016) Scalable industry data access control in RFID-enabled supply chain. IEEE\/ACM Trans Netw (ToN) 24(6):3551\u20133564, 3.376","journal-title":"IEEE\/ACM Trans Netw (ToN)"},{"issue":"11","key":"1289_CR20","doi-asserted-by":"publisher","first-page":"3413","DOI":"10.1109\/TC.2016.2538260","volume":"65","author":"S Qi","year":"2016","unstructured":"Qi S, Zheng Y, Li M, Lu L, Liu Y (2016) Secure and private RFID-enabled third-party supply chain systems. IEEE Trans Comput (TC) 65(11):3413\u20133426 2.916","journal-title":"IEEE Trans Comput (TC)"},{"key":"1289_CR21","doi-asserted-by":"publisher","unstructured":"Qi S, Zheng Y Crypt-DAC: cryptographically enforced dynamic access control in the Cloud, IEEE Transactions on Dependable and Secure Computing, 29 March 2019. https:\/\/doi.org\/10.1109\/TDSC.2019.2908164","DOI":"10.1109\/TDSC.2019.2908164"},{"issue":"3\u20134","key":"1289_CR22","first-page":"229","volume":"12","author":"M Xi","year":"2011","unstructured":"Xi M, Qi Y, Wu K, Zhao J, Li M (2011) Using potential to guide mobile nodes in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 12(3\u20134):229\u2013251","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"1289_CR23","doi-asserted-by":"crossref","unstructured":"Wang WY (2017) \u201cLiar, Liar pants on fire\u201d: a new benchmark dataset for fake news detection. In: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers). Association for Computational Linguistics, pp 422\u2013426","DOI":"10.18653\/v1\/P17-2067"},{"key":"1289_CR24","doi-asserted-by":"crossref","unstructured":"Qian F, Gong C, Sharma K, Liu Y (2018) Neural user response generator: fake news detection with collective user intelligence. In: Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, IJCAI-18. International Joint Conferences on Artificial Intelligence Organization, pp 3834\u20133840","DOI":"10.24963\/ijcai.2018\/533"},{"issue":"1988","key":"1289_CR25","first-page":"1","volume":"3","author":"DE Rumelhart","year":"1988","unstructured":"Rumelhart DE, Hinton GE, Williams RJ et al (1988) Learning representations by back-propagating errors. Cogn Model 3(1988):1","journal-title":"Cogn Model"},{"key":"1289_CR26","doi-asserted-by":"publisher","unstructured":"Yan J, Qi Y, Rao Q (2018) Detecting malware with an ensemble method based on deep neural network. https:\/\/doi.org\/10.1155\/2018\/7247095, UNSP 7247095","DOI":"10.1155\/2018\/7247095"},{"key":"1289_CR27","doi-asserted-by":"publisher","unstructured":"Chen P,Qi Y, Li X, Hou D, Lyu MR-T (2016) ARF-Predictor: effective prediction of aging-related failure using entropy. https:\/\/doi.org\/10.1109\/TDSC.2016.2604381","DOI":"10.1109\/TDSC.2016.2604381"},{"key":"1289_CR28","doi-asserted-by":"publisher","unstructured":"Wang X, Qi Y, Wang Z et al Design and implementation of SecPod: a framework for virtualization-based security systems. https:\/\/doi.org\/10.1109\/TDSC.2017.2675991","DOI":"10.1109\/TDSC.2017.2675991"},{"issue":"8","key":"1289_CR29","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, J\u00fcrgen S (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"1289_CR30","doi-asserted-by":"crossref","unstructured":"Wang P, Qi Y, Liu X (2014) Power-aware optimization for heterogeneous multi-tier clusters, pages 2005\u20132015","DOI":"10.1016\/j.jpdc.2013.09.003"},{"key":"1289_CR31","doi-asserted-by":"publisher","unstructured":"Sun Z, Song H, Wang H, Fan X Energy balance-based steerable arguments coverage method in WSNs. IEEE Access 2017 Mar 20, Issue: 99. 6: 33766\u201333773. https:\/\/doi.org\/10.1109\/ACCESS.2017.2682845","DOI":"10.1109\/ACCESS.2017.2682845"},{"key":"1289_CR32","doi-asserted-by":"crossref","unstructured":"Rashkin H, Choi E, Jang JY, Volkova S, Choi Y (2017) Truth of varying shades: analyzing language in fake news and political fact-checking. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp 2921\u20132927","DOI":"10.18653\/v1\/D17-1317"},{"key":"1289_CR33","doi-asserted-by":"crossref","unstructured":"Volkova S, Shaffer K, Jang JY, Hodas N (2017) Separating facts from fiction: linguistic models to classify suspicious and trusted news posts on twitter. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), Vol. 2. 647\u2013653","DOI":"10.18653\/v1\/P17-2102"},{"key":"1289_CR34","doi-asserted-by":"crossref","unstructured":"Zheng P, Qi Y, Zhou Y, Chen P, Zhan J, L yu MR-T (2014) An automatic framework for detecting and characterizing the performance degradation of software systems. 63:927\u2013943","DOI":"10.1109\/TR.2014.2338255"},{"key":"1289_CR35","unstructured":"Chopra S, Jain S, Sholar JM (2017) Towards automatic identification of fake news: Headline-article stance detection with LSTM attention models"},{"key":"1289_CR36","doi-asserted-by":"crossref","unstructured":"Kim Y (2014) Convolutional neural networks for sentence classification. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing, pages 1746\u20131751","DOI":"10.3115\/v1\/D14-1181"},{"key":"1289_CR37","unstructured":"Mikolov T, Sutskever I, Chen K, Corrado GS, Dean J (2013) Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems, pages 3111\u20133119"},{"issue":"3","key":"1289_CR38","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu HC, Luk RWP, Wong KF, Kwok KL (Jun. 2008) Interpreting TF-IDF term weights as making relevance decisions. ACM Trans Inf Syst 26(3):13","journal-title":"ACM Trans Inf Syst"},{"issue":"1","key":"1289_CR39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0306-4573(02)00021-3","volume":"39","author":"A Aizawa","year":"2003","unstructured":"Aizawa A (2003) An information-theoretic perspective of TF\u2013IDF measures. Inf Process Manage 39(1):45\u201365","journal-title":"Inf Process Manage"},{"key":"1289_CR40","doi-asserted-by":"crossref","unstructured":"Qiao Y-n, Yong Q, Di H (2001) Tensor field model for higher-order information retrieval. 84(12):2303\u20132313","DOI":"10.1016\/j.jss.2011.06.057"},{"issue":"5","key":"1289_CR41","doi-asserted-by":"publisher","first-page":"4794","DOI":"10.3390\/s110504794","volume":"11","author":"W Wei","year":"2011","unstructured":"Wei W, Yong Q (2011) Information potential fields navigation in wireless ad-hoc sensor networks. Sensors 11(5):4794\u20134807","journal-title":"Sensors"},{"issue":"11","key":"1289_CR42","doi-asserted-by":"crossref","first-page":"3013","DOI":"10.1002\/dac.2522","volume":"27","author":"Q Xu","year":"2014","unstructured":"Xu Q, Wang L, Hei XH, Shen P, Shi W, Shan L (2014) GI\/Geom\/1 queue based on communication model for mesh networks. Int J Commun Syst 27(11):3013\u20133029","journal-title":"Int J Commun Syst"},{"issue":"10","key":"1289_CR43","doi-asserted-by":"publisher","first-page":"135054","DOI":"10.1155\/2012\/135054","volume":"8","author":"XL Yang","year":"2012","unstructured":"Yang XL, Shen PY et al (2012) Holes detection in anisotropic sensornets: topological methods [J]. Int J Distrib Sens Netw 8(10):135054","journal-title":"Int J Distrib Sens Netw"},{"issue":"C","key":"1289_CR44","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.ins.2017.04.042","volume":"408","author":"H Song","year":"2017","unstructured":"Song H, Li W, Shen P, Vasilakos A (2017) Gradient-driven parking navigation using a continuous information potential field based on wireless sensor network. Inf Sci 408(C):100\u2013114. https:\/\/doi.org\/10.1016\/j.ins.2017.04.042","journal-title":"Inf Sci"},{"issue":"8","key":"1289_CR45","first-page":"4218","volume":"36","author":"Y Qiang","year":"2013","unstructured":"Qiang Y, Zhang J (2013) A bijection between lattice-valued filters and lattice-valued congruences in residuated lattices. Math Probl Eng 36(8):4218\u20134229","journal-title":"Math Probl Eng"},{"key":"1289_CR46","doi-asserted-by":"crossref","unstructured":"Yang XL, Zhou B, Feng J, Shen PY (2012) Combined energy minimization for image reconstruction from few views. Math Probl Eng 2012","DOI":"10.1155\/2012\/154630"},{"key":"1289_CR47","doi-asserted-by":"publisher","unstructured":"Srivastava HM, Zhang Y, Wang L, Shen P, Zhang J (2014) A local fractional integral inequality on fractal space analogous to Anderson\u2019s inequality[C]\/\/Abstract and Applied Analysis. Hindawi Publishing Corporation, 46(8): 5218\u20135229, Ariticle number: 797561, https:\/\/doi.org\/10.1155\/2014\/797561, WOS:000339756400001","DOI":"10.1155\/2014\/797561"},{"key":"1289_CR48","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.neucom.2017.07.072","volume":"288","author":"J Zhang","year":"2018","unstructured":"Zhang J, Song H, Wan Y (2018) Big data analytics enabled by feature extraction based on partial independence. Neurocomputing 288:3\u201310","journal-title":"Neurocomputing"},{"key":"1289_CR49","unstructured":"Ma J, Gao W, Mitra P, Kwon S, Jansen BJ, Wong K-F, Cha M (2016) Detecting rumors from microblogs with recurrent neural networks. In: IJCAI, pp 3818\u20133824"},{"key":"1289_CR50","doi-asserted-by":"crossref","unstructured":"Ma J, Gao W, Wong K-F (2017) Detect rumors in microblog posts using propagation structure via kernel learning. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Vol. 1. pp 708\u2013717","DOI":"10.18653\/v1\/P17-1066"},{"key":"1289_CR51","unstructured":"Pennebaker JW, Boyd RL, Jordan K, Blackburn K (2015) The development and psychometric properties of LIWC2015. Technical Report"},{"key":"1289_CR52","unstructured":"Ren Y, Zhang Y (2016) Deceptive opinion spam detection using neural network. In: Proceedings of COLING 2016, the 26th International Conference on Computational Linguistics: Technical Papers, pages 140\u2013150"},{"key":"1289_CR53","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.eswa.2019.01.060","volume":"126","author":"J Zhang","year":"2019","unstructured":"Zhang J, WeiWei DP, Wo\u017aniak M, Ko\u015bmider L, Dama\u0161ev\u012dcius R (2019) A neuro-heuristic approach for recognition of lung diseases from X-ray images. Author links open overlay panel. Exp Syst Appl 126:218\u2013232","journal-title":"Exp Syst Appl"},{"key":"1289_CR54","doi-asserted-by":"crossref","unstructured":"Ji Y, Eisenstein J (2014) Representation learning for text-level discourse parsing. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), volume 1, pages 13\u201324","DOI":"10.3115\/v1\/P14-1002"},{"issue":"5","key":"1289_CR55","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1002\/asi.23216","volume":"66","author":"VL Rubin","year":"2015","unstructured":"Rubin VL, Lukoianova T (2015) Truth and deception at the rhetorical structure level. J Assoc Inf Sci Technol 66(5):905\u2013917","journal-title":"J Assoc Inf Sci Technol"},{"key":"1289_CR56","doi-asserted-by":"crossref","unstructured":"Wang X, Qi Y, Wang Z et al (2019) Design and implementation of SecPod: a framework for virtualization-based security systems. 16(1):44\u201357","DOI":"10.1109\/TDSC.2017.2675991"}],"updated-by":[{"DOI":"10.1007\/s00779-022-01670-4","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T00:00:00Z","timestamp":1646956800000}}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01289-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-019-01289-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01289-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T20:54:52Z","timestamp":1721595292000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-019-01289-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,8]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1289"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01289-y","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s00779-022-01670-4","asserted-by":"object"}]},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,8]]},"assertion":[{"value":"28 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2022","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s00779-022-01670-4","URL":"https:\/\/doi.org\/10.1007\/s00779-022-01670-4","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}