{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T13:41:54Z","timestamp":1774705314131,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"crossref","award":["1845639"],"award-info":[{"award-number":["1845639"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000083","name":"Directorate for Computer and Information Science and Engineering","doi-asserted-by":"crossref","award":["1831669"],"award-info":[{"award-number":["1831669"]}],"id":[{"id":"10.13039\/100000083","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s13278-020-00689-w","type":"journal-article","created":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T18:15:24Z","timestamp":1598984124000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["FauxWard: a graph neural network approach to fauxtography detection using social media comments"],"prefix":"10.1007","volume":"10","author":[{"given":"Lanyu","family":"Shang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9599-8023","authenticated-orcid":false,"given":"Dong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"key":"689_CR2","doi-asserted-by":"crossref","unstructured":"Bayar B, Stamm MC (2016) A deep learning approach to universal image manipulation detection using a new convolutional layer. In: Proceedings of the 4th ACM workshop on information hiding and multimedia security, pp 5\u201310","DOI":"10.1145\/2909827.2930786"},{"key":"689_CR3","unstructured":"Chen J, Ma T, Xiao C (2018) Fastgcn: fast learning with graph convolutional networks via importance sampling. arXiv preprint arXiv:180110247"},{"key":"689_CR4","unstructured":"Cooper SD (2007) A concise history of the fauxtography blogstorm in the 2006 lebanon war. Am Commun J 9"},{"key":"689_CR12","unstructured":"Cooper BB (2013) Fast company. How twitter\u2019s expanded images increase clicks, retweets and favorites. https:\/\/www.fastcompany.com\/3022116\/what-twitters-expanded-images-mean-for-clicks-retweets-and-favorites"},{"key":"689_CR5","doi-asserted-by":"crossref","unstructured":"Cui L, Wang S, Lee D (2019) Same: sentiment-aware multi-modal embedding for detecting fake news. In: Proceedings of the 2019 IEEE\/ACM international conference on advances in social networks analysis and mining, pp 41\u201348","DOI":"10.1145\/3341161.3342894"},{"key":"689_CR7","unstructured":"Fout A, Byrd J, Shariat B, Ben-Hur A (2017) Protein interface prediction using graph convolutional networks. In: Advances in neural information processing systems, pp 6530\u20136539"},{"key":"689_CR8","unstructured":"Fridrich AJ, Soukal BD, Luk\u00e1\u0161 AJ (2003) Detection of copy-move forgery in digital images. In: Proceedings of digital forensic research workshop, Citeseer"},{"key":"689_CR9","doi-asserted-by":"crossref","unstructured":"Gupta A, Lamba H, Kumaraguru P, Joshi A (2013) Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd international conference on World Wide Web, pp 729\u2013736","DOI":"10.1145\/2487788.2488033"},{"key":"689_CR10","doi-asserted-by":"crossref","unstructured":"Hamaguchi T, Oiwa H, Shimbo M, Matsumoto Y (2017) Knowledge transfer for out-of-knowledge-base entities: a graph neural network approach. arXiv preprint arXiv:170605674","DOI":"10.24963\/ijcai.2017\/250"},{"key":"689_CR11","unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. In: Advances in neural information processing systems, pp 1024\u20131034"},{"key":"689_CR6","unstructured":"Hill C (2017) Market Watch. Facebook and google\u2019s war with fake news heats up. https:\/\/www.marketwatch.com\/story\/facebook-and-googles-war-with-fake-news-heats-up-2017-04-14"},{"key":"689_CR13","doi-asserted-by":"crossref","unstructured":"Huynh-Kha T, Le-Tien T, Ha-Viet-Uyen S, Huynh-Van K, Luong M (2016) A robust algorithm of forgery detection in copy-move and spliced images. Int J Adv Comput Sci Appl 7(3)","DOI":"10.14569\/IJACSA.2016.070301"},{"key":"689_CR14","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. arXiv preprint arXiv:14126980"},{"key":"689_CR15","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:160902907"},{"key":"689_CR16","doi-asserted-by":"crossref","unstructured":"Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on World wide web, pp 591\u2013600","DOI":"10.1145\/1772690.1772751"},{"issue":"6380","key":"689_CR17","doi-asserted-by":"publisher","first-page":"1094","DOI":"10.1126\/science.aao2998","volume":"359","author":"DM Lazer","year":"2018","unstructured":"Lazer DM, Baum MA, Benkler Y, Berinsky AJ, Greenhill KM, Menczer F, Metzger MJ, Nyhan B, Pennycook G, Rothschild D et al (2018) The science of fake news. Science 359(6380):1094\u20131096","journal-title":"Science"},{"key":"689_CR18","doi-asserted-by":"crossref","unstructured":"Li R, Wang S, Zhu F, Huang J (2018) Adaptive graph convolutional neural networks. In: Thirty-second AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v32i1.11691"},{"key":"689_CR22","unstructured":"Mallonee L (2016) Wired. Photo fuels spread of fake news. https:\/\/www.wired.com\/2016\/12\/photos-fuel-spread-fake-news\/"},{"key":"689_CR19","doi-asserted-by":"publisher","first-page":"1303","DOI":"10.1109\/TIFS.2019.2935913","volume":"15","author":"F Matern","year":"2019","unstructured":"Matern F, Riess C, Stamminger M (2019) Gradient-based illumination description for image forgery detection. IEEE Transactions on Information Forensics and Security 15:1303\u20131317","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"689_CR27","unstructured":"Murphy N (2019) Reddit. Reddit\u2019s 2019 year in review. https:\/\/redditblog.com\/2019\/12\/04\/reddits-2019-year-in-review\/"},{"key":"689_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen TH, Grishman R (2018) Graph convolutional networks with argument-aware pooling for event detection. In: Thirty-second AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v32i1.12039"},{"key":"689_CR21","unstructured":"P\u00e9rez-Rosas V, Kleinberg B, Lefevre A, Mihalcea R (2017) Automatic detection of fake news. arXiv preprint arXiv:170807104"},{"key":"689_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.osnem.2018.11.001","volume":"9","author":"S Priya","year":"2019","unstructured":"Priya S, Sequeira R, Chandra J, Dandapat SK (2019) Where should one get news updates: Twitter or reddit. Online Soc Netw Media 9:17\u201329","journal-title":"Online Soc Netw Media"},{"issue":"8","key":"689_CR24","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/TIFS.2015.2423261","volume":"10","author":"CM Pun","year":"2015","unstructured":"Pun CM, Yuan XC, Bi XL (2015) Image forgery detection using adaptive oversegmentation and feature point matching. IEEE Trans Inf Forensics Secur 10(8):1705\u20131716","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"689_CR25","first-page":"3834","volume":"18","author":"F Qian","year":"2018","unstructured":"Qian F, Gong C, Sharma K, Liu Y (2018) Neural user response generator: fake news detection with collective user intelligence. IJCAI 18:3834\u20133840","journal-title":"IJCAI"},{"key":"689_CR26","doi-asserted-by":"crossref","unstructured":"Rashid MT, Wang D (2020) Covidsens: a vision on reliable social sensing for covid-19. Artif Intell Rev, pp 1\u201325","DOI":"10.1007\/s10462-020-09852-3"},{"key":"689_CR32","unstructured":"Saleh K (2015) Invesp. Social media engagement statistics and trends. https:\/\/www.invespcro.com\/blog\/social-media-engagement\/. Accessed 07 Aug 2018"},{"key":"689_CR28","doi-asserted-by":"crossref","unstructured":"Schlichtkrull M, Kipf TN, Bloem P, Van Den\u00a0Berg R, Titov I, Welling M (2018) Modeling relational data with graph convolutional networks. In: European semantic web conference, Springer, Berlin, pp 593\u2013607","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"689_CR29","doi-asserted-by":"publisher","first-page":"104851","DOI":"10.1016\/j.knosys.2019.07.022","volume":"182","author":"L Shang","year":"2019","unstructured":"Shang L, Zhang DY, Wang M, Lai S, Wang D (2019a) Towards reliable online clickbait video detection: a content-agnostic approach. Knowl-Based Syst 182:104851","journal-title":"Knowl-Based Syst"},{"key":"689_CR30","doi-asserted-by":"crossref","unstructured":"Shang L, Zhang DY, Wang M, Wang D (2019b) Vulnercheck: a content-agnostic detector for online hatred-vulnerable videos. In: 2019 IEEE international conference on big data (Big Data), IEEE, pp 573\u2013582","DOI":"10.1109\/BigData47090.2019.9006329"},{"issue":"1","key":"689_CR31","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu K, Sliva A, Wang S, Tang J, Liu H (2017) Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor Newsl 19(1):22\u201336","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"689_CR1","unstructured":"Smith K (2020) Brand watch. 60 incredible and interesting twitter stats and statistics. https:\/\/www.brandwatch.com\/blog\/twitter-stats-and-statistics\/"},{"key":"689_CR33","doi-asserted-by":"crossref","unstructured":"Vo N, Lee K (2018) The rise of guardians: fact-checking url recommendation to combat fake news. arXiv preprint arXiv:180607516","DOI":"10.1145\/3209978.3210037"},{"key":"689_CR34","doi-asserted-by":"crossref","unstructured":"Volkova S, Shaffer K, Jang JY, Hodas N (2017) Separating facts from fiction: linguistic models to classify suspicious and trusted news posts on twitter. In: Proceedings of the 55th annual meeting of the association for computational linguistics (volume 2: short papers), pp 647\u2013653","DOI":"10.18653\/v1\/P17-2102"},{"issue":"6","key":"689_CR35","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1007\/s11241-015-9238-8","volume":"51","author":"D Wang","year":"2015","unstructured":"Wang D, Abdelzaher T, Kaplan L, Ganti R, Hu S, Liu H (2015b) Reliable social sensing with physical constraints: analytic bounds and performance evaluation. Real-Time Syst 51(6):724\u2013762","journal-title":"Real-Time Syst"},{"issue":"1","key":"689_CR36","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MC.2018.2890173","volume":"52","author":"D Wang","year":"2019","unstructured":"Wang D, Szymanski BK, Abdelzaher T, Ji H, Kaplan L (2019) The age of social sensing. Computer 52(1):36\u201345","journal-title":"Computer"},{"key":"689_CR37","doi-asserted-by":"crossref","unstructured":"Wang D, Abdelzaher T, Kaplan L (2015a) Social sensing: building reliable systems on unreliable data. Morgan Kaufmann","DOI":"10.1016\/B978-0-12-800867-6.00005-4"},{"key":"689_CR38","doi-asserted-by":"crossref","unstructured":"Wang D, Abdelzaher T, Kaplan L, Aggarwal CC (2013a) Recursive fact-finding: a streaming approach to truth estimation in crowdsourcing applications. In: 2013 IEEE 33rd international conference on distributed computing systems, IEEE, pp 530\u2013539","DOI":"10.1109\/ICDCS.2013.54"},{"key":"689_CR39","doi-asserted-by":"crossref","unstructured":"Wang D, Abdelzaher T, Kaplan L, Ganti R, Hu S, Liu H (2013b) Exploitation of physical constraints for reliable social sensing. In: Real-time systems symposium (RTSS), 2013 IEEE 34th, IEEE, pp 212\u2013223","DOI":"10.1109\/RTSS.2013.29"},{"key":"689_CR40","doi-asserted-by":"crossref","unstructured":"Wang D, Amin MT, Li S, Abdelzaher T, Kaplan L, Gu S, Pan C, Liu H, Aggarwal CC, Ganti R, et\u00a0al. (2014) Using humans as sensors: an estimation-theoretic perspective. In: Information processing in sensor networks, IPSN-14 proceedings of the 13th international symposium on, IEEE, pp 35\u201346","DOI":"10.1109\/IPSN.2014.6846739"},{"key":"689_CR41","doi-asserted-by":"publisher","unstructured":"Wang D, Kaplan L, Le H, Abdelzaher T (2012) On truth discovery in social sensing: a maximum likelihood estimation approach. In: Proceedings of ACM\/IEEE 11th international information processing in sensor networks (IPSN) conference, pp 233\u2013244. https:\/\/doi.org\/10.1109\/IPSN.2012.6920960","DOI":"10.1109\/IPSN.2012.6920960"},{"key":"689_CR42","unstructured":"Wang D, Szymanski BK, Abdelzaher T, Ji H, Kaplan L (2018) The age of social sensing. arXiv preprint arXiv:180109116"},{"key":"689_CR43","unstructured":"Wu Z, Pan S, Chen F, Long G, Zhang C, Yu PS (2019) A comprehensive survey on graph neural networks. arXiv preprint arXiv:190100596"},{"key":"689_CR44","unstructured":"Yang Y, Zheng L, Zhang J, Cui Q, Li Z, Yu PS (2018) Ti-cnn: Convolutional neural networks for fake news detection. arXiv preprint arXiv:180600749"},{"issue":"1","key":"689_CR45","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.tele.2016.04.010","volume":"34","author":"QQ Yao","year":"2017","unstructured":"Yao QQ, Perlmutter DD, Liu JZ (2017) What are shaping the ethical bottom line?: Identifying factors influencing young readers\u2019 acceptance of digital news photo alteration. Telematics Inform 34(1):124\u2013132","journal-title":"Telematics Inform"},{"issue":"6","key":"689_CR46","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TKDE.2007.190745","volume":"20","author":"X Yin","year":"2008","unstructured":"Yin X, Han J, Yu PS (2008) Truth discovery with multiple conflicting information providers on the web. IEEE Trans Knowl Data Eng 20(6):796\u2013808. https:\/\/doi.org\/10.1109\/TKDE.2007.190745","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"689_CR47","doi-asserted-by":"crossref","unstructured":"Ying R, He R, Chen K, Eksombatchai P, Hamilton WL, Leskovec J (2018a) Graph convolutional neural networks for web-scale recommender systems. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, ACM, pp 974\u2013983","DOI":"10.1145\/3219819.3219890"},{"key":"689_CR48","unstructured":"Ying Z, You J, Morris C, Ren X, Hamilton W, Leskovec J (2018b) Hierarchical graph representation learning with differentiable pooling. In: Advances in neural information processing systems, pp 4800\u20134810"},{"key":"689_CR49","unstructured":"Zhang DY, Badilla J, Zhang Y, Wang D (2018b) Towards reliable missing truth discovery in online social media sensing applications. In: 2018 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 143\u2013150"},{"key":"689_CR50","doi-asserted-by":"crossref","unstructured":"Zhang DY, Li Q, Tong H, Badilla J, Zhang Y, Wang D (2018c) Crowdsourcing-based copyright infringement detection in live video streams. In: 2018 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 367\u2013374","DOI":"10.1109\/ASONAM.2018.8508523"},{"key":"689_CR51","doi-asserted-by":"crossref","unstructured":"Zhang DY, Shang L, Geng B, Lai S, Li K, Zhu H, Amin MT, Wang D (2018d) Fauxbuster: a content-free fauxtography detector using social media comments. In: 2018 IEEE international conference on big data (Big Data), IEEE, pp 891\u2013900","DOI":"10.1109\/BigData.2018.8622344"},{"key":"689_CR52","doi-asserted-by":"crossref","unstructured":"Zhang DY, Song L, Li Q, Zhang Y, Wang D (2018e) Streamguard: a bayesian network approach to copyright infringement detection problem in large-scale live video sharing systems. In: 2018 IEEE international conference on big data (big data), IEEE, pp 901\u2013910","DOI":"10.1109\/BigData.2018.8622306"},{"key":"689_CR53","doi-asserted-by":"crossref","unstructured":"Zhang DY, Wang D, Zhang Y (2017) Constraint-aware dynamic truth discovery in big data social media sensing. In: Big data (big data), 2017 IEEE international conference on, IEEE, pp 57\u201366","DOI":"10.1109\/BigData.2017.8257911"},{"issue":"2","key":"689_CR54","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/TBDATA.2018.2824812","volume":"5","author":"D Zhang","year":"2018","unstructured":"Zhang D, Wang D, Vance N, Zhang Y, Mike S (2018a) On scalable and robust truth discovery in big data social media sensing applications. IEEE Trans Big Data 5(2):195\u2013208","journal-title":"IEEE Trans Big Data"},{"key":"689_CR55","unstructured":"Zhang J, Cui L, Fu Y, Gouza FB (2018f) Fake news detection with deep diffusive network model. arXiv preprint arXiv:180508751"},{"key":"689_CR56","doi-asserted-by":"crossref","unstructured":"Zhang Y, Dong X, Rashid MT, Shang L, Han J, Zhang D, Wang D (2020a) Pqa-cnn: Towards perceptual quality assured single-image super-resolution in remote sensing. In: 2020 IEEE\/ACM international symposium on quality of service, IEEE","DOI":"10.1109\/IWQoS49365.2020.9212942"},{"key":"689_CR57","doi-asserted-by":"crossref","unstructured":"Zhang Y, Dong X, Shang L, Zhang D, Wang D (2020b) A multi-modal graph neural network approach to traffic risk forecasting in smart urban sensing. In: The 17th annual IEEE international conference on sensing, communication and networking, IEEE","DOI":"10.1109\/SECON48991.2020.9158447"},{"key":"689_CR58","doi-asserted-by":"crossref","unstructured":"Zhang D, Vance N, Wang D (2019) When social sensing meets edge computing: vision and challenges. In: 2019 28th International conference on computer communication and networks (ICCCN), IEEE, pp 1\u20139","DOI":"10.1109\/ICCCN.2019.8847174"},{"key":"689_CR59","unstructured":"Zhou J, Cui G, Zhang Z, Yang C, Liu Z, Wang L, Li C, Sun M (2018) Graph neural networks: a review of methods and applications. arXiv preprint arXiv:181208434"},{"key":"689_CR60","unstructured":"Zhou X, Zafarani R (2018) Fake news: a survey of research, detection methods, and opportunities. arXiv preprint arXiv:181200315"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-00689-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-020-00689-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-00689-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T19:34:29Z","timestamp":1668540869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-020-00689-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,1]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["689"],"URL":"https:\/\/doi.org\/10.1007\/s13278-020-00689-w","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,1]]},"assertion":[{"value":"2 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"76"}}