{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:11:21Z","timestamp":1767917481124,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91746106"],"award-info":[{"award-number":["91746106"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71904010"],"award-info":[{"award-number":["71904010"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11227-021-03748-x","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T11:03:28Z","timestamp":1617275008000},"page":"12050-12074","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A two-step rumor detection model based on the supernetwork theory about Weibo"],"prefix":"10.1007","volume":"77","author":[{"given":"Xuefan","family":"Dong","sequence":"first","affiliation":[]},{"given":"Ying","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Yuxue","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Xianyi","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1448-511X","authenticated-orcid":false,"given":"Yijun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"3748_CR1","doi-asserted-by":"publisher","first-page":"104945","DOI":"10.1016\/j.knosys.2019.104945","volume":"185","author":"SM Alzanin","year":"2019","unstructured":"Alzanin SM, Azmi AM (2019) Rumor detection in Arabic tweets using semi-supervised and unsupervised expectation\u2013maximization. Knowl-Based Syst 185:104945. https:\/\/doi.org\/10.1016\/j.knosys.2019.104945","journal-title":"Knowl-Based Syst"},{"key":"3748_CR2","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.ins.2019.05.035","volume":"497","author":"A Bondielli","year":"2019","unstructured":"Bondielli A, Marcelloni F (2019) A survey on fake news and rumour detection techniques. Inform Sci 497:38\u201355. https:\/\/doi.org\/10.1016\/j.ins.2019.05.035","journal-title":"Inform Sci"},{"key":"3748_CR3","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.patrec.2017.10.014","volume":"105","author":"W Chen","year":"2018","unstructured":"Chen W, Zhang Y, Yeo CK, Lau CT, Lee BS (2018) Unsupervised rumor detection based on users\u2019 behaviors using neural networks. Pattern Recogn Lett 105:226\u2013233. https:\/\/doi.org\/10.1016\/j.patrec.2017.10.014","journal-title":"Pattern Recogn Lett"},{"key":"3748_CR4","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.knosys.2018.12.027","volume":"168","author":"Y Chi","year":"2019","unstructured":"Chi Y, Tang X, Lian Y, Dong X, Liu Y (2019) A supernetwork-based online post informative quality evaluation model. Knowl-Based Syst 168:10\u201324. https:\/\/doi.org\/10.1016\/j.knosys.2018.12.027","journal-title":"Knowl-Based Syst"},{"key":"3748_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/7562567","volume":"2020","author":"M Guo","year":"2020","unstructured":"Guo M, Xu Z, Liu L, Guo M, Zhang Y, Kotsiantis SB (2020) An Adaptive deep transfer learning model for rumor detection without sufficient identified rumors. Math Probl Eng 2020:1\u201312. https:\/\/doi.org\/10.1155\/2020\/7562567","journal-title":"Math Probl Eng"},{"key":"3748_CR6","doi-asserted-by":"publisher","first-page":"117652","DOI":"10.1016\/j.jclepro.2019.117652","volume":"238","author":"L He","year":"2019","unstructured":"He L, Mao J, Hu C, Xiao Z (2019) Carbon emission regulation and operations in the supply chain supernetwork under stringent carbon policy. J Clean Prod 238:117652. https:\/\/doi.org\/10.1016\/j.jclepro.2019.117652","journal-title":"J Clean Prod"},{"key":"3748_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05236-4","author":"Q Huang","year":"2020","unstructured":"Huang Q, Zhou C, Wu J, Liu L, Wang B (2020) Deep spatial\u2013temporal structure learning for rumor detection on Twitter. Neural Comput Appl. https:\/\/doi.org\/10.1007\/s00521-020-05236-4","journal-title":"Neural Comput Appl"},{"key":"3748_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1469-8137.1912.tb05611.x","volume":"11","author":"P Jaccard","year":"1912","unstructured":"Jaccard P (1912) The Distribution of the Flora in the Alpine Zone. New Phytol 11:37\u201350","journal-title":"New Phytol"},{"key":"3748_CR9","doi-asserted-by":"crossref","unstructured":"Jain S, Sharma V, Kaushal R (2016) Towards automated real-time detection of misinformation on TwitterInternational Conference on Advances in Computing, Communications and Informatics. IEEE, pp 2015\u20132020","DOI":"10.1109\/ICACCI.2016.7732347"},{"key":"3748_CR10","first-page":"519","volume-title":"Sheffi: \"Urban Transportation Networks: Equilibrium Analysis with Mathematical Programming Methods\" (Book Review)","author":"R Kuner","year":"1986","unstructured":"Kuner R (1986) Sheffi: \u201cUrban Transportation Networks: Equilibrium Analysis with Mathematical Programming Methods\u201d (Book Review). American Planning Association, Washington, D.C., p 519"},{"key":"3748_CR11","doi-asserted-by":"publisher","first-page":"e168344","DOI":"10.1371\/journal.pone.0168344","volume":"12","author":"S Kwon","year":"2017","unstructured":"Kwon S, Cha M, Jung K, Gao Z (2017) Rumor detection over varying time windows. PLoS ONE 12:e168344. https:\/\/doi.org\/10.1371\/journal.pone.0168344","journal-title":"PLoS ONE"},{"key":"3748_CR12","doi-asserted-by":"publisher","first-page":"100097","DOI":"10.1016\/j.osnem.2020.100097","volume":"19","author":"S Lathiya","year":"2020","unstructured":"Lathiya S, Dhobi JS, Zubiaga A, Liakata M, Procter R (2020) Birds of a feather check together: leveraging homophily for sequential rumour detection. Online soc net media 19:100097. https:\/\/doi.org\/10.1016\/j.osnem.2020.100097","journal-title":"Online soc net media"},{"key":"3748_CR13","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.3390\/su12041345","volume":"12","author":"Y Li","year":"2020","unstructured":"Li Y, Gao X, Du M, He R, Yang S, Xiong J (2020) What causes different sentiment classification on social network services? evidence from weibo with genetically modified food in China. Sustainability-Basel 12:1345. https:\/\/doi.org\/10.3390\/su12041345","journal-title":"Sustainability-Basel"},{"key":"3748_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102420","author":"Z Li","year":"2021","unstructured":"Li Z, Zhang Q, Du X, Ma Y, Wang S (2021) Social media rumor refutation effectiveness: evaluation, modelling and enhancement. Inform Process Manag. https:\/\/doi.org\/10.1016\/j.ipm.2020.102420","journal-title":"Inform Process Manag"},{"key":"3748_CR15","doi-asserted-by":"publisher","first-page":"55108","DOI":"10.1109\/ACCESS.2019.2913005","volume":"7","author":"Y Lian","year":"2019","unstructured":"Lian Y, Dong X, Chi Y, Tang X, Liu Y (2019) An internet water army detection supernetwork model. Ieee Access 7:55108\u201355120. https:\/\/doi.org\/10.1109\/ACCESS.2019.2913005","journal-title":"Ieee Access"},{"key":"3748_CR16","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/TCSS.2016.2517458","volume":"2","author":"G Liang","year":"2015","unstructured":"Liang G, He W, Xu C, Chen L, Zeng J (2015) Rumor identification in microblogging systems based on users\u2019 behavior. IEEE transac comput soc syst 2:99\u2013108. https:\/\/doi.org\/10.1109\/TCSS.2016.2517458","journal-title":"IEEE transac comput soc syst"},{"key":"3748_CR17","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1109\/TCSS.2020.2998092","volume":"7","author":"M Ling","year":"2020","unstructured":"Ling M, Chen Q, Sun Q, Jia Y (2020) Hybrid Neural Network for Sina Weibo Sentiment Analysis. IEEE transac comput soc syst 7:983\u2013990. https:\/\/doi.org\/10.1109\/TCSS.2020.2998092","journal-title":"IEEE transac comput soc syst"},{"key":"3748_CR18","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.trb.2019.05.017","volume":"132","author":"P Liu","year":"2020","unstructured":"Liu P, Liao F, Tian Q, Huang H, Timmermans H (2020) Day-to-day needs-based activity-travel dynamics and equilibria in multi-state supernetworks. Transp Res Part B Methodol 132:208\u2013227. https:\/\/doi.org\/10.1016\/j.trb.2019.05.017","journal-title":"Transp Res Part B Methodol"},{"key":"3748_CR19","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.dss.2014.05.011","volume":"64","author":"Y Liu","year":"2014","unstructured":"Liu Y, Li Q, Tang X, Ma N, Tian R (2014) Superedge prediction: what opinions will be mined based on an opinion supernetwork model? Decis Support Syst 64:118\u2013129. https:\/\/doi.org\/10.1016\/j.dss.2014.05.011","journal-title":"Decis Support Syst"},{"key":"3748_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCSS.2016.2612980","volume":"3","author":"Y Liu","year":"2016","unstructured":"Liu Y, Xu S (2016) Detecting rumors through modeling information propagation networks in a social media environment. IEEE transac comput soc syst 3:46\u201362. https:\/\/doi.org\/10.1109\/TCSS.2016.2612980","journal-title":"IEEE transac comput soc syst"},{"key":"3748_CR21","doi-asserted-by":"publisher","first-page":"107818","DOI":"10.1016\/j.patcog.2021.107818","volume":"113","author":"Y Luo","year":"2021","unstructured":"Luo Y, Ma J, Yeo CK (2021) BCMM: A novel post-based augmentation representation for early rumour detection on social media. Pattern Recogn 113:107818. https:\/\/doi.org\/10.1016\/j.patcog.2021.107818","journal-title":"Pattern Recogn"},{"key":"3748_CR22","doi-asserted-by":"publisher","first-page":"105250","DOI":"10.1016\/j.childyouth.2020.105250","volume":"116","author":"Y Lyu","year":"2020","unstructured":"Lyu Y, Chow JC, Hwang J (2020) Exploring public attitudes of child abuse in mainland China: a sentiment analysis of China\u2019s social media weibo. Child Youth Serv Rev 116:105250. https:\/\/doi.org\/10.1016\/j.childyouth.2020.105250","journal-title":"Child Youth Serv Rev"},{"key":"3748_CR23","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1177\/0165551519828619","volume":"46","author":"J Ma","year":"2020","unstructured":"Ma J, Luo Y (2020) The classification of rumour standpoints in online social network based on combinatorial classifiers. J Inf Sci 46:191\u2013204. https:\/\/doi.org\/10.1177\/0165551519828619","journal-title":"J Inf Sci"},{"key":"3748_CR24","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1016\/j.eswa.2013.08.033","volume":"41","author":"N Ma","year":"2014","unstructured":"Ma N, Liu Y (2014) SuperedgeRank algorithm and its application in identifying opinion leader of online public opinion supernetwork. Expert Syst Appl 41:1357\u20131368. https:\/\/doi.org\/10.1016\/j.eswa.2013.08.033","journal-title":"Expert Syst Appl"},{"key":"3748_CR25","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.ins.2013.11.016","volume":"260","author":"Z Miller","year":"2014","unstructured":"Miller Z, Dickinson B, Deitrick W, Hu W, Wang AH (2014) Twitter spammer detection using data stream clustering. Inform Sciences 260:64\u201373. https:\/\/doi.org\/10.1016\/j.ins.2013.11.016","journal-title":"Inform Sciences"},{"key":"3748_CR26","doi-asserted-by":"publisher","first-page":"123174","DOI":"10.1016\/j.physa.2019.123174","volume":"540","author":"FA Ozbay","year":"2020","unstructured":"Ozbay FA, Alatas B (2020) Fake news detection within online social media using supervised artificial intelligence algorithms. Phys A 540:123174. https:\/\/doi.org\/10.1016\/j.physa.2019.123174","journal-title":"Phys A"},{"key":"3748_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-009-0440-2","author":"G Ruan","year":"2010","unstructured":"Ruan G, Tan Y (2010) A three-layer back-propagation neural network for spam detection using artificial immune concentration. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-009-0440-2","journal-title":"Soft Comput"},{"key":"3748_CR28","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1287\/opre.2015.1455","volume":"64","author":"D Shah","year":"2016","unstructured":"Shah D, Zaman T (2016) Finding rumor sources on random trees. Oper Res 64:736\u2013755. https:\/\/doi.org\/10.1287\/opre.2015.1455","journal-title":"Oper Res"},{"key":"3748_CR29","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.eswa.2018.05.019","volume":"110","author":"R Sicilia","year":"2018","unstructured":"Sicilia R, Lo Giudice S, Pei Y, Pechenizkiy M, Soda P (2018) Twitter rumour detection in the health domain. Expert Syst Appl 110:33\u201340. https:\/\/doi.org\/10.1016\/j.eswa.2018.05.019","journal-title":"Expert Syst Appl"},{"key":"3748_CR30","first-page":"120","volume-title":"Detecting Event Rumors on Sina Weibo Automatically15th Asia-Pacific Web Conference","author":"S Sun","year":"2013","unstructured":"Sun S, Liu H, He J, Du X (2013) Detecting Event Rumors on Sina Weibo Automatically15th Asia-Pacific Web Conference. Springer, Berlin Heidelberg, Sydney, Australia, pp 120\u2013131"},{"key":"3748_CR31","volume-title":"On rumors: how falsehoods spread, why we believe them, what can be done","author":"CR Sunstein","year":"2009","unstructured":"Sunstein CR (2009) On rumors: how falsehoods spread, why we believe them, what can be done. Farrar, Straus and Giroux, New York"},{"key":"3748_CR32","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.dss.2014.09.001","volume":"67","author":"R Tian","year":"2014","unstructured":"Tian R, Liu Y (2014) Isolation, insertion, and reconstruction: Three strategies to intervene in rumor spread based on supernetwork model. Decis Support Syst 67:121\u2013130. https:\/\/doi.org\/10.1016\/j.dss.2014.09.001","journal-title":"Decis Support Syst"},{"key":"3748_CR33","doi-asserted-by":"publisher","first-page":"106269","DOI":"10.1016\/j.chb.2020.106269","volume":"106","author":"A Triantafillidou","year":"2020","unstructured":"Triantafillidou A, Yannas P (2020) Social media crisis communication in racially charged crises: exploring the effects of social media and image restoration strategies. Comput Hum Behav 106:106269. https:\/\/doi.org\/10.1016\/j.chb.2020.106269","journal-title":"Comput Hum Behav"},{"key":"3748_CR34","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.ins.2020.12.080","volume":"560","author":"K Tu","year":"2021","unstructured":"Tu K, Chen C, Hou C, Yuan J, Li J, Yuan X (2021) Rumor2vec: a rumor detection framework with joint text and propagation structure representation learning. Inform Sciences 560:137\u2013151. https:\/\/doi.org\/10.1016\/j.ins.2020.12.080","journal-title":"Inform Sciences"},{"key":"3748_CR35","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1007\/s11227-019-02913-7","volume":"76","author":"S Venkatraman","year":"2020","unstructured":"Venkatraman S, Surendiran B, Arun Raj Kumar P (2020) Spam e-mail classification for the Internet of things environment using semantic similarity approach. J Supercomput 76:756\u2013776. https:\/\/doi.org\/10.1007\/s11227-019-02913-7","journal-title":"J Supercomput"},{"key":"3748_CR36","unstructured":"Vosoughi S (2015) Automatic Detection and Verification of Rumors on Twitter. ProQuest Dissertations Publishing"},{"key":"3748_CR37","doi-asserted-by":"publisher","first-page":"2808","DOI":"10.1016\/j.eswa.2014.11.026","volume":"42","author":"G Wang","year":"2015","unstructured":"Wang G, Liu Y, Li J, Tang X, Wang H (2015) Superedge coupling algorithm and its application in coupling mechanism analysis of online public opinion supernetwork. Expert Syst Appl 42:2808\u20132823. https:\/\/doi.org\/10.1016\/j.eswa.2014.11.026","journal-title":"Expert Syst Appl"},{"key":"3748_CR38","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.im.2017.10.004","volume":"55","author":"Q Wang","year":"2018","unstructured":"Wang Q, Yang X, Xi W (2018) Effects of group arguments on rumor belief and transmission in online communities: An information cascade and group polarization perspective. Inform Manage-Amster 55:441\u2013449. https:\/\/doi.org\/10.1016\/j.im.2017.10.004","journal-title":"Inform Manage-Amster"},{"key":"3748_CR39","doi-asserted-by":"crossref","unstructured":"Yang F, Liu Y, Yu X, Yang M (2012) Automatic detection of rumor on Sina Weibo","DOI":"10.1145\/2350190.2350203"},{"key":"3748_CR40","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.neucom.2020.10.070","volume":"428","author":"J Yin","year":"2021","unstructured":"Yin J, Li Q, Liu S, Wu Z, Xu G (2021) Leveraging multi-level dependency of relational sequences for social spammer detection. Neurocomputing 428:130\u2013141. https:\/\/doi.org\/10.1016\/j.neucom.2020.10.070","journal-title":"Neurocomputing"},{"key":"3748_CR41","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.knosys.2014.03.015","volume":"64","author":"Y Zhang","year":"2014","unstructured":"Zhang Y, Wang S, Phillips P, Ji G (2014) Binary PSO with mutation operator for feature selection using decision tree applied to spam detection. Knowl-Based Syst 64:22\u201331. https:\/\/doi.org\/10.1016\/j.knosys.2014.03.015","journal-title":"Knowl-Based Syst"},{"key":"3748_CR42","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.physa.2017.03.013","volume":"479","author":"L Zhao","year":"2017","unstructured":"Zhao L, Zhang H, Wu W (2017) Knowledge service decision making in business incubators based on the supernetwork model. Phys A 479:249\u2013264. https:\/\/doi.org\/10.1016\/j.physa.2017.03.013","journal-title":"Phys A"},{"key":"3748_CR43","doi-asserted-by":"crossref","unstructured":"Zhao Z, Resnick P, Mei Q (2015) Enquiring Minds: Early Detection of Rumors in Social Media from Enquiry Posts24th International Conference on World Wide Web. ACM, Florence, Italy, pp 1395\u20131405","DOI":"10.1145\/2736277.2741637"},{"key":"3748_CR44","doi-asserted-by":"publisher","first-page":"45240","DOI":"10.1109\/ACCESS.2019.2909552","volume":"7","author":"Y Zhou","year":"2019","unstructured":"Zhou Y, Wu C, Zhu Q, Xiang Y, Loke SW (2019) Rumor source detection in networks based on the SEIR model. Ieee Access 7:45240\u201345258. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909552","journal-title":"Ieee Access"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03748-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03748-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03748-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T08:52:10Z","timestamp":1744188730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03748-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,1]]},"references-count":44,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["3748"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03748-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,1]]},"assertion":[{"value":"13 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}