{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:04:31Z","timestamp":1776114271169,"version":"3.50.1"},"reference-count":182,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T00:00:00Z","timestamp":1601337600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T00:00:00Z","timestamp":1601337600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s13278-020-00696-x","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T20:03:00Z","timestamp":1601409780000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":220,"title":["Deep learning for misinformation detection on online social networks: a survey and new perspectives"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7209-3881","authenticated-orcid":false,"given":"Md Rafiqul","family":"Islam","sequence":"first","affiliation":[]},{"given":"Shaowu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xianzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,29]]},"reference":[{"key":"696_CR1","unstructured":"Abadi M, Agarwal A, Barham P, Brevdo E, Chen Z, Citro C, Corrado GS, Davis A, Dean J, Devin M, et al. (2015) Tensorflow: large-scale machine learning on heterogeneous systems, 2015. Software available from tensorflow. org 1"},{"key":"696_CR2","doi-asserted-by":"crossref","unstructured":"Abdel-Hamid O, Mohamed, A.r., Jiang, H., Deng, L., Penn, G., Yu, D., (2014) Convolutional neural networks for speech recognition. IEEE\/ACM Trans Audio Speech Lang Process 22:1533\u20131545","DOI":"10.1109\/TASLP.2014.2339736"},{"key":"696_CR3","doi-asserted-by":"crossref","first-page":"10975","DOI":"10.1073\/pnas.0904891106","volume":"106","author":"A Acquisti","year":"2009","unstructured":"Acquisti A, Gross R (2009) Predicting social security numbers from public data. Proc Nat Acad Sci 106:10975\u201310980","journal-title":"Proc Nat Acad Sci"},{"key":"696_CR4","doi-asserted-by":"crossref","first-page":"1268","DOI":"10.1109\/TMM.2013.2265080","volume":"15","author":"LM Aiello","year":"2013","unstructured":"Aiello LM, Petkos G, Martin C, Corney D, Papadopoulos S, Skraba R, G\u00f6ker A, Kompatsiaris I, Jaimes A (2013) Sensing trending topics in twitter. IEEE Trans Multimedia 15:1268\u20131282","journal-title":"IEEE Trans Multimedia"},{"key":"696_CR5","doi-asserted-by":"crossref","unstructured":"Aizenberg IN (1999) Neural networks based on multi-valued and universal binary neurons: theory, application to image processing and recognition. In: International conference on computational intelligence, Springer, pp 306\u2013316","DOI":"10.1007\/3-540-48774-3_36"},{"key":"696_CR6","doi-asserted-by":"crossref","first-page":"102018","DOI":"10.1016\/j.ipm.2019.02.016","volume":"57","author":"SA Alkhodair","year":"2020","unstructured":"Alkhodair SA, Ding SH, Fung BC, Liu J (2020) Detecting breaking news rumors of emerging topics in social media. Inf Process Manag 57:102018","journal-title":"Inf Process Manag"},{"key":"696_CR7","doi-asserted-by":"crossref","unstructured":"Alom MZ, Bontupalli V, Taha TM (2015) Intrusion detection using deep belief networks. In: 2015 national aerospace and electronics conference (NAECON), IEEE, pp 339\u2013344","DOI":"10.1109\/NAECON.2015.7443094"},{"key":"696_CR8","first-page":"403","volume":"9","author":"G Bathla","year":"2018","unstructured":"Bathla G, Aggarwal H, Rani R (2018) Improving recommendation techniques by deep learning and large scale graph partitioning. Int J Adv Comput Sci Appl 9:403\u2013409","journal-title":"Int J Adv Comput Sci Appl"},{"key":"696_CR9","doi-asserted-by":"crossref","unstructured":"Bharti SK, Pradhan R, Babu KS, Jena SK (2017) Sarcasm analysis on twitter data using machine learning approaches. In: Trends in social network analysis. Springer, pp 51\u201376","DOI":"10.1007\/978-3-319-53420-6_3"},{"key":"696_CR10","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1016\/j.chb.2017.04.001","volume":"73","author":"P Bindu","year":"2017","unstructured":"Bindu P, Thilagam PS, Ahuja D (2017) Discovering suspicious behavior in multilayer social networks. Comput Hum Behav 73:568\u2013582","journal-title":"Comput Hum Behav"},{"key":"696_CR11","doi-asserted-by":"crossref","first-page":"63","DOI":"10.2105\/AJPH.2011.300292","volume":"102","author":"AM Brandt","year":"2012","unstructured":"Brandt AM (2012) Inventing conflicts of interest: a history of tobacco industry tactics. Am J Public Health 102:63\u201371","journal-title":"Am J Public Health"},{"key":"696_CR12","doi-asserted-by":"crossref","unstructured":"Bra\u015foveanu AM, Andonie R (2019) Semantic fake news detection: a machine learning perspective. In: International work-conference on artificial neural networks, Springer, pp 656\u2013667","DOI":"10.1007\/978-3-030-20521-8_54"},{"key":"696_CR13","unstructured":"Chalapathy R, Chawla S (2019) Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407"},{"key":"696_CR14","doi-asserted-by":"crossref","unstructured":"Chen T, Li X, Yin H, Zhang J (2018) Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection. In: Pacific-Asia conference on knowledge discovery and data mining, Springer, pp 40\u201352","DOI":"10.1007\/978-3-030-04503-6_4"},{"key":"696_CR15","doi-asserted-by":"crossref","unstructured":"Chen YC, Liu ZY, Kao HY (2017) Ikm at semeval-2017 task 8: vonvolutional neural networks for stance detection and rumor verification. In: Proceedings of the 11th international workshop on semantic evaluation (SemEval-2017), pp 465\u2013469","DOI":"10.18653\/v1\/S17-2081"},{"key":"696_CR16","doi-asserted-by":"crossref","unstructured":"Cho K, van Merri\u00ebnboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y, (2014a) Learning phrase representations using RNN encoder\u2013decoder for statistical machine translation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), Association for Computational Linguistics, Doha, Qatar. pp 1724\u20131734. https:\/\/www.aclweb.org\/anthology\/D14-1179, 10.3115\/v1\/D14-1179","DOI":"10.3115\/v1\/D14-1179"},{"key":"696_CR17","doi-asserted-by":"crossref","unstructured":"Cho K, Van Merri\u00ebnboer B, Gulcehre C, Bahdanau D, Bougares F, Schwenk H, Bengio Y (2014b) Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078","DOI":"10.3115\/v1\/D14-1179"},{"key":"696_CR18","volume-title":"Deep learning mit Python und Keras: Das Praxis-Handbuch vom Entwickler der Keras-Bibliothek","author":"F Chollet","year":"2018","unstructured":"Chollet F (2018) Deep learning mit Python und Keras: Das Praxis-Handbuch vom Entwickler der Keras-Bibliothek. MITP-Verlags GmbH & Co, KG"},{"key":"696_CR19","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s13278-019-0582-x","volume":"9","author":"O \u00c7\u0131tlak","year":"2019","unstructured":"\u00c7\u0131tlak O, D\u00f6rterler M, Do\u011fru \u0130A (2019) A survey on detecting spam accounts on twitter network. Soc Netw Anal Min 9:35","journal-title":"Soc Netw Anal Min"},{"key":"696_CR20","volume-title":"Torch: a modular machine learning software library","author":"R Collobert","year":"2002","unstructured":"Collobert R, Bengio S, Mari\u00e9thoz J (2002) Torch: a modular machine learning software library. Technical Report, Idiap"},{"key":"696_CR21","unstructured":"Collobert R, Kavukcuoglu K, Farabet C (2011) Torch7: a matlab-like environment for machine learning. In: BigLearn, NIPS workshop"},{"key":"696_CR22","unstructured":"Concone F, Re GL, Morana M, Ruocco C (2019) Twitter spam account detection by effective labeling. In: ITASEC"},{"key":"696_CR23","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.dss.2015.09.003","volume":"80","author":"S Cresci","year":"2015","unstructured":"Cresci S, Di Pietro R, Petrocchi M, Spognardi A, Tesconi M (2015) Fame for sale: efficient detection of fake twitter followers. Decis Support Syst 80:56\u201371","journal-title":"Decis Support Syst"},{"key":"696_CR24","doi-asserted-by":"crossref","unstructured":"Cui L, Wang S, Lee D (2019) Same: sentiment-aware multi-modal embedding for detecting fake news. In: Proceedings of the 2019 IEEE\/ACM international conference on advances in social networks analysis and mining, pp 41\u201348","DOI":"10.1145\/3341161.3342894"},{"key":"696_CR25","first-page":"101","volume":"8","author":"LA Da Silva","year":"2018","unstructured":"Da Silva LA, Da Costa KA, Papa JP, Rosa G, De Albuquerque VHC (2018) Fine-tuning restricted boltzmann machines using quaternions and its application for spam detection. IET Netw 8:101\u2013105","journal-title":"IET Netw"},{"key":"696_CR26","doi-asserted-by":"crossref","unstructured":"Dai JJ, Wang Y, Qiu X, Ding D, Zhang Y, Wang Y, Jia X, Zhang LC, Wan Y, Li Z, Wang J, Huang S, Wu Z, Wang Y, Yang Y, She B, Shi D, Lu Q, Huang K, Song G (2019) Bigdl: A distributed deep learning framework for big data. In: Proceedings of the ACM symposium on cloud computing, Association for Computing Machinery. pp 50\u201360. https:\/\/arxiv.org\/pdf\/1804.05839.pdf, 10.1145\/3357223.3362707","DOI":"10.1145\/3357223.3362707"},{"key":"696_CR27","doi-asserted-by":"crossref","unstructured":"Dandekar A, Zen RA, Bressan S (2017) Generating fake but realistic headlines using deep neural networks. In: International conference on database and expert systems applications, Springer, pp 427\u2013440","DOI":"10.1007\/978-3-319-64471-4_34"},{"key":"696_CR28","doi-asserted-by":"crossref","unstructured":"David OE, Netanyahu NS (2015) Deepsign: Deep learning for automatic malware signature generation and classification. In: 2015 international joint conference on neural networks (IJCNN), IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2015.7280815"},{"key":"696_CR29","doi-asserted-by":"crossref","unstructured":"De Choudhury M, Counts S, Horvitz E (2013a) Predicting postpartum changes in emotion and behavior via social media. In: Proceedings of the SIGCHI conference on human factors in computing systems, ACM, pp 3267\u20133276","DOI":"10.1145\/2470654.2466447"},{"key":"696_CR30","doi-asserted-by":"crossref","unstructured":"De\u00a0Choudhury M, Gamon M, Hoff A, Roseway A (2013b) \u00e2\u0102IJmoon phrases\u00e2\u0102\u0130: a social media faciliated tool for emotional reflection and wellness. In: 2013 7th international conference on pervasive computing technologies for healthcare and workshops, IEEE, pp 41\u201344","DOI":"10.4108\/icst.pervasivehealth.2013.252106"},{"key":"696_CR31","unstructured":"Dechter R (1986) Learning while searching in constraint-satisfaction problems. University of California, Computer Science Department, Cognitive Systems \u00e2\u0102\u0229"},{"key":"696_CR32","unstructured":"Dhamani N, Azunre P, Gleason JL, Corcoran C, Honke G, Kramer S, Morgan J (2019) Using deep networks and transfer learning to address disinformation. arXiv preprint arXiv:1905.10412"},{"key":"696_CR33","unstructured":"Donfro J (2013) A whopping 20% of yelp reviews are fake"},{"key":"696_CR34","doi-asserted-by":"crossref","unstructured":"Du M, Li F, Zheng G, Srikumar V (2017) Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, ACM, pp 1285\u20131298","DOI":"10.1145\/3133956.3134015"},{"key":"696_CR35","unstructured":"Fallis D (2014) A functional analysis of disinformation. In: Conference 2014 proceedings"},{"key":"696_CR36","unstructured":"Farajtabar M, Yang J, Ye X, Xu H, Trivedi R, Khalil E, Li S, Song L, Zha H (2017) Fake news mitigation via point process based intervention. In: Proceedings of the 34th international conference on machine learning, vol 70, pp 1097\u20131106"},{"key":"696_CR37","unstructured":"Feng VW, Hirst G (2013) Detecting deceptive opinions with profile compatibility. In: Proceedings of the sixth international joint conference on natural language processing, pp 338\u2013346"},{"key":"696_CR38","first-page":"595","volume":"2018","author":"M Fernandez","year":"2018","unstructured":"Fernandez M, Alani H (2018) Online misinformation: challenges and future directions. Companion Proc Web Conf 2018:595\u2013602","journal-title":"Companion Proc Web Conf"},{"key":"696_CR39","doi-asserted-by":"crossref","unstructured":"Friggeri A, Adamic L, Eckles D, Cheng J (2014) Rumor cascades. In: Eighth international AAAI conference on weblogs and social media","DOI":"10.1609\/icwsm.v8i1.14559"},{"key":"696_CR40","unstructured":"Galitsky B (2015) Detecting rumor and disinformation by web mining. In: 2015 AAAI Spring symposium series"},{"key":"696_CR41","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-1-4614-8579-7_8","volume":"11","author":"H Gao","year":"2014","unstructured":"Gao H, Liu H (2014) Data analysis on location-based social networks. Mobile Soc Netw 11:165\u2013194","journal-title":"Mobile Soc Netw"},{"key":"696_CR42","unstructured":"Gong M, Gao Y, Xie Y, Qin A (2020) An attention-based unsupervised adversarial model for movie review spam detection. In: IEEE transactions on multimedia"},{"key":"696_CR43","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672\u20132680"},{"key":"696_CR44","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s13278-016-0414-1","volume":"6","author":"A Goswami","year":"2016","unstructured":"Goswami A, Kumar A (2016) A survey of event detection techniques in online social networks. Soc Netw Anal Min 6:107","journal-title":"Soc Netw Anal Min"},{"key":"696_CR45","unstructured":"Guo B, Ding Y, Yao L, Liang Y, Yu Z (2019) The future of misinformation detection: new perspectives and trends. arXiv preprint arXiv:1909.03654"},{"key":"696_CR46","doi-asserted-by":"crossref","unstructured":"Guo H, Cao J, Zhang Y, Guo J, Li J (2018) Rumor detection with hierarchical social attention network. In: Proceedings of the 27th ACM international conference on information and knowledge management, ACM, pp 943\u2013951","DOI":"10.1145\/3269206.3271709"},{"key":"696_CR47","doi-asserted-by":"crossref","unstructured":"Gupta A, Kumaraguru P, Castillo C, Meier P (2014) Tweetcred: Real-time credibility assessment of content on twitter. In: International Conference on Social Informatics, Springer, pp 228\u2013243","DOI":"10.1007\/978-3-319-13734-6_16"},{"key":"696_CR48","doi-asserted-by":"crossref","unstructured":"Gupta A, Lamba H, Kumaraguru P, Joshi A (2013) Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd international conference on World Wide Web, ACM, pp 729\u2013736","DOI":"10.1145\/2487788.2488033"},{"key":"696_CR49","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/s13278-019-0595-5","volume":"9","author":"A Habib","year":"2019","unstructured":"Habib A, Asghar MZ, Khan A, Habib A, Khan A (2019) False information detection in online content and its role in decision making: a systematic literature review. Soc Netw Anal Min 9:50","journal-title":"Soc Netw Anal Min"},{"key":"696_CR50","unstructured":"Hardy W, Chen L, Hou S, Ye Y, Li X (2016) Dl4md: a deep learning framework for intelligent malware detection. In: Proceedings of the international conference on data mining (DMIN), the steering committee of the world congress in computer science, computer \u00e2\u0102\u0229, p\u00a061"},{"key":"696_CR51","doi-asserted-by":"crossref","unstructured":"Helmstetter S, Paulheim H (2018) Weakly supervised learning for fake news detection on twitter. In: 2018 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 274\u2013277","DOI":"10.1109\/ASONAM.2018.8508520"},{"key":"696_CR52","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/0740-624X(95)90052-7","volume":"12","author":"P Hernon","year":"1995","unstructured":"Hernon P (1995) Disinformation and misinformation through the internet: findings of an exploratory study. Gov Inf Q 12:133\u2013139","journal-title":"Gov Inf Q"},{"key":"696_CR53","doi-asserted-by":"crossref","unstructured":"Hinton G, Deng L, Yu D, Dahl G, Mohamed Ar, Jaitly N, Senior A, Vanhoucke V, Nguyen P, Kingsbury B, et\u00a0al. (2012) Deep neural networks for acoustic modeling in speech recognition. In: IEEE Signal processing magazine, p 29","DOI":"10.1109\/MSP.2012.2205597"},{"key":"696_CR54","doi-asserted-by":"crossref","unstructured":"Horne BD, Adali S (2017) This just in: fake news packs a lot in title, uses simpler, repetitive content in text body, more similar to satire than real news. In: Eleventh international AAAI conference on web and social media","DOI":"10.1609\/icwsm.v11i1.14976"},{"key":"696_CR55","unstructured":"Hu X, Tang J, Zhang Y, Liu H (2013) Social spammer detection in microblogging. In: Twenty-third international joint conference on artificial intelligence"},{"key":"696_CR56","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1007\/s13755-018-0046-0","volume":"6","author":"MR Islam","year":"2018","unstructured":"Islam MR, Kabir MA, Ahmed A, Kamal ARM, Wang H, Ulhaq A (2018a) Depression detection from social network data using machine learning techniques. Health Inf Sci Syst 6:8","journal-title":"Health Inf Sci Syst"},{"key":"696_CR57","doi-asserted-by":"crossref","unstructured":"Islam MR, Kamal ARM, Sultana N, Islam R, Moni MA, et\u00a0al. (2018b) Detecting depression using k-nearest neighbors (knn) classification technique. In: 2018 international conference on computer, communication, chemical, material and electronic engineering (IC4ME2), IEEE, pp 1\u20134","DOI":"10.1109\/IC4ME2.2018.8465641"},{"key":"696_CR58","doi-asserted-by":"crossref","unstructured":"Islam MR, Miah SJ, Kamal ARM, Burmeister O (2019) A design construct of developing approaches to measure mental health conditions. In: Australasian journal of information systems, p 23","DOI":"10.3127\/ajis.v23i0.1829"},{"key":"696_CR59","doi-asserted-by":"crossref","unstructured":"Jacovi A, Shalom OS, Goldberg Y (2018) Understanding convolutional neural networks for text classification. arXiv preprint arXiv:1809.08037","DOI":"10.18653\/v1\/W18-5408"},{"key":"696_CR60","doi-asserted-by":"crossref","unstructured":"Jain S, Sharma V, Kaushal R (2016) Towards automated real-time detection of misinformation on twitter. In: 2016 international conference on advances in computing. Communications and informatics (ICACCI), IEEE, pp 2015\u20132020","DOI":"10.1109\/ICACCI.2016.7732347"},{"key":"696_CR61","doi-asserted-by":"crossref","unstructured":"Jia Y, Shelhamer E, Donahue J, Karayev S, Long J, Girshick R, Guadarrama S, Darrell T (2014) Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the 22nd ACM international conference on Multimedia, ACM, pp 675\u2013678","DOI":"10.1145\/2647868.2654889"},{"key":"696_CR62","doi-asserted-by":"crossref","unstructured":"Jia Y, Song X, Zhou J, Liu L, Nie L, Rosenblum DS (2016) Fusing social networks with deep learning for volunteerism tendency prediction. In: Thirtieth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v30i1.9985"},{"key":"696_CR63","doi-asserted-by":"crossref","unstructured":"Jin D, Ge M, Li Z, Lu W, He D, Fogelman-Soulie F (2017a) Using deep learning for community discovery in social networks. In: 2017 IEEE 29th international conference on tools with artificial intelligence (ICTAI), IEEE, pp 160\u2013167","DOI":"10.1109\/ICTAI.2017.00035"},{"key":"696_CR64","doi-asserted-by":"crossref","unstructured":"Jin Z, Cao J, Guo H, Zhang Y, Luo J (2017b) Multimodal fusion with recurrent neural networks for rumor detection on microblogs. In: Proceedings of the 25th ACM international conference on multimedia, pp 795\u2013816","DOI":"10.1145\/3123266.3123454"},{"key":"696_CR65","doi-asserted-by":"crossref","unstructured":"Jin Z, Cao J, Guo H, Zhang Y, Wang Y, Luo J (2017c) Detection and analysis of 2016 us presidential election related rumors on twitter. In: International conference on social computing, behavioral-cultural modeling and prediction and behavior representation in modeling and simulation, Springer, pp 14\u201324","DOI":"10.1007\/978-3-319-60240-0_2"},{"key":"696_CR66","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1109\/TMM.2016.2617078","volume":"19","author":"Z Jin","year":"2016","unstructured":"Jin Z, Cao J, Zhang Y, Zhou J, Tian Q (2016) Novel visual and statistical image features for microblogs news verification. IEEE Trans Multimedia 19:598\u2013608","journal-title":"IEEE Trans Multimedia"},{"key":"696_CR67","unstructured":"Jindal S, Sood R, Singh R, Vatsa M, Chakraborty T (xxxx) Newsbag: a multimodal benchmark dataset for fake news detection"},{"key":"696_CR68","doi-asserted-by":"crossref","unstructured":"Ketkar N (2017) Introduction to pytorch. In: Deep learning with python. Springer, pp 195\u2013208","DOI":"10.1007\/978-1-4842-2766-4_12"},{"key":"696_CR69","doi-asserted-by":"crossref","unstructured":"Kim J, Tabibian B, Oh A, Sch\u00f6lkopf B, Gomez-Rodriguez M (2018) Leveraging the crowd to detect and reduce the spread of fake news and misinformation. In: Proceedings of the eleventh ACM international conference on web search and data mining, pp 324\u2013332","DOI":"10.1145\/3159652.3159734"},{"key":"696_CR70","doi-asserted-by":"crossref","unstructured":"Kim Y (2014) Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882","DOI":"10.3115\/v1\/D14-1181"},{"key":"696_CR71","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King DE (2009) Dlib-ml: a machine learning toolkit. J Mach Learn Res 10:1755\u20131758","journal-title":"J Mach Learn Res"},{"key":"696_CR72","unstructured":"Kochkina E, Liakata M, Zubiaga A (2018) All-in-one: Multi-task learning for rumour verification. arXiv preprint arXiv:1806.03713"},{"key":"696_CR73","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.ins.2018.08.019","volume":"467","author":"S Kudugunta","year":"2018","unstructured":"Kudugunta S, Ferrara E (2018) Deep neural networks for bot detection. Inf Sci 467:312\u2013322","journal-title":"Inf Sci"},{"key":"696_CR74","first-page":"e3767","volume":"5","author":"S Kumar","year":"2019","unstructured":"Kumar S, Asthana R, Upadhyay S, Upreti N, Akbar M (2019) Fake news detection using deep learning models: a novel approach. Trans Emerg Telecommun Technol 5:e3767","journal-title":"Trans Emerg Telecommun Technol"},{"key":"696_CR75","unstructured":"Kumar S, Shah N (2018) False information on web and social media: a survey. arXiv preprint arXiv:1804.08559"},{"key":"696_CR76","doi-asserted-by":"crossref","unstructured":"Kumar S, West R, Leskovec J (2016) Disinformation on the web: Impact, characteristics, and detection of wikipedia hoaxes. In: Proceedings of the 25th international conference on World Wide Web, pp 591\u2013602","DOI":"10.1145\/2872427.2883085"},{"key":"696_CR77","first-page":"69","volume":"12","author":"S Kwon","year":"2017","unstructured":"Kwon S, Cha M, Jung K (2017) Rumor detection over varying time windows. PloS ONE 12:69","journal-title":"PloS ONE"},{"key":"696_CR78","unstructured":"Lake JM (2014) Fake web addresses and hyperlinks. US Patent 8,799,465"},{"key":"696_CR79","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521:436","journal-title":"Nature"},{"key":"696_CR80","doi-asserted-by":"crossref","unstructured":"LeCun Y, Kavukcuoglu K, Farabet C (2010) Convolutional networks and applications in vision. In: Proceedings of 2010 IEEE international symposium on circuits and systems, IEEE, pp 253\u2013256","DOI":"10.1109\/ISCAS.2010.5537907"},{"key":"696_CR81","doi-asserted-by":"crossref","first-page":"e4281","DOI":"10.1002\/cpe.4281","volume":"30","author":"C Li","year":"2018","unstructured":"Li C, Liu S (2018) A comparative study of the class imbalance problem in twitter spam detection. Concurr Comput Pract Exp 30:e4281","journal-title":"Concurr Comput Pract Exp"},{"key":"696_CR82","doi-asserted-by":"crossref","unstructured":"Li L, Cai G, Chen N (2018a) A rumor events detection method based on deep bidirectional gru neural network. In: 2018 IEEE 3rd international conference on image. Vision and computing (ICIVC), IEEE, pp 755\u2013759","DOI":"10.1109\/ICIVC.2018.8492819"},{"key":"696_CR83","doi-asserted-by":"crossref","unstructured":"Li X, Wu X (2015) Constructing long short-term memory based deep recurrent neural networks for large vocabulary speech recognition. In: 2015 IEEE international conference on acoustics. Speech and signal processing (ICASSP), IEEE, pp 4520\u20134524","DOI":"10.1109\/ICASSP.2015.7178826"},{"key":"696_CR84","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.eswa.2017.12.016","volume":"96","author":"Y Li","year":"2018","unstructured":"Li Y, Nie X, Huang R (2018b) Web spam classification method based on deep belief networks. Expert Syst Appl 96:261\u2013270","journal-title":"Expert Syst Appl"},{"key":"696_CR85","doi-asserted-by":"crossref","first-page":"7076","DOI":"10.1109\/TIE.2016.2586442","volume":"63","author":"L Liao","year":"2016","unstructured":"Liao L, Jin W, Pavel R (2016) Enhanced restricted boltzmann machine with prognosability regularization for prognostics and health assessment. IEEE Trans Industr Electron 63:7076\u20137083","journal-title":"IEEE Trans Industr Electron"},{"key":"696_CR86","doi-asserted-by":"crossref","unstructured":"Lin X, Liao X, Xu T, Pian W, Wong KF (2019) Rumor detection with hierarchical recurrent convolutional neural network. In: CCF international conference on natural language processing and chinese computing, Springer, pp 338\u2013348","DOI":"10.1007\/978-3-030-32236-6_30"},{"key":"696_CR87","first-page":"1","volume":"9","author":"Q Liu","year":"2018","unstructured":"Liu Q, Yu F, Wu S, Wang L (2018) Mining significant microblogs for misinformation identification: an attention-based approach. ACM Trans Intell Syst Technol 9:1\u201320","journal-title":"ACM Trans Intell Syst Technol"},{"key":"696_CR88","doi-asserted-by":"crossref","unstructured":"Liu Y, Wu YFB (2018) Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks. In: Thirty-second AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"696_CR89","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3386253","volume":"38","author":"Y Liu","year":"2020","unstructured":"Liu Y, Wu YFB (2020) Fned: a deep network for fake news early detection on social media. ACM Trans Inf Syst 38:1\u201333","journal-title":"ACM Trans Inf Syst"},{"key":"696_CR90","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TCSS.2016.2612980","volume":"3","author":"Y Liu","year":"2016","unstructured":"Liu Y, Xu S (2016) Detecting rumors through modeling information propagation networks in a social media environment. IEEE Trans Comput Soc Syst 3:46\u201362","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"696_CR91","unstructured":"Long Y, Lu Q, Xiang R, Li M, Huang CR (2017) Fake news detection through multi-perspective speaker profiles. In: Proceedings of the eighth international joint conference on natural language processing, vol 2, pp 252\u2013256"},{"key":"696_CR92","unstructured":"Ma J, Gao W, Mitra P, Kwon S, Jansen BJ, Wong KF, Cha M (2016) Detecting rumors from microblogs with recurrent neural networks. In: Ijcai, pp 3818\u20133824"},{"key":"696_CR93","doi-asserted-by":"crossref","unstructured":"Ma J, Gao W, Wei Z, Lu Y, Wong KF (2015) Detect rumors using time series of social context information on microblogging websites. In: Proceedings of the 24th ACM international on conference on information and knowledge management, pp 1751\u20131754","DOI":"10.1145\/2806416.2806607"},{"key":"696_CR94","doi-asserted-by":"crossref","unstructured":"Ma J, Gao W, Wong KF (2018) Rumor detection on twitter with tree-structured recursive neural networks. In: Proceedings of the 56th annual meeting of the association for computational linguistics, vol 1, pp 1980\u20131989","DOI":"10.18653\/v1\/P18-1184"},{"key":"696_CR95","doi-asserted-by":"crossref","unstructured":"Ma J, Gao W, Wong KF (2019) Detect rumors on twitter by promoting information campaigns with generative adversarial learning. In: The World Wide Web Conference, ACM, pp 3049\u20133055","DOI":"10.1145\/3308558.3313741"},{"key":"696_CR96","doi-asserted-by":"crossref","unstructured":"Markines B, Cattuto C, Menczer F (2009) Social spam detection. In: Proceedings of the 5th international workshop on adversarial information retrieval on the web, pp 41\u201348","DOI":"10.1145\/1531914.1531924"},{"key":"696_CR97","doi-asserted-by":"crossref","unstructured":"Mitra T, Gilbert E (2015) Credbank: A large-scale social media corpus with associated credibility annotations. In: ICWSM, pp 258\u2013267","DOI":"10.1609\/icwsm.v9i1.14625"},{"key":"696_CR98","doi-asserted-by":"crossref","unstructured":"Mukherjee A, Venkataraman V, Liu B, Glance NS (2013) What yelp fake review filter might be doing? In: Icwsm, pp 409\u2013418","DOI":"10.1609\/icwsm.v7i1.14389"},{"key":"696_CR99","doi-asserted-by":"crossref","unstructured":"Nan CJ, Kim KM, Zhang BT (2015) Social network analysis of tv drama characters via deep concept hierarchies. In: 2015 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 831\u2013836","DOI":"10.1145\/2808797.2809306"},{"key":"696_CR100","first-page":"91","volume":"6","author":"U Naseem","year":"2020","unstructured":"Naseem U, Razzak I, Musial K, Imran M (2020) Transformer based deep intelligent contextual embedding for twitter sentiment analysis. Future Gener Comput Syst 6:91","journal-title":"Future Gener Comput Syst"},{"key":"696_CR101","doi-asserted-by":"crossref","unstructured":"Nguyen DT, Al\u00a0Mannai KA, Joty S, Sajjad H, Imran M, Mitra P (2017a) Robust classification of crisis-related data on social networks using convolutional neural networks. In: Eleventh international AAAI conference on web and social media","DOI":"10.1609\/icwsm.v11i1.14950"},{"key":"696_CR102","doi-asserted-by":"crossref","unstructured":"Nguyen TN, Li C, Nieder\u00e9e C (2017b) On early-stage debunking rumors on twitter: Leveraging the wisdom of weak learners. In: International conference on social informatics, Springer, pp 141\u2013158","DOI":"10.1007\/978-3-319-67256-4_13"},{"key":"696_CR103","doi-asserted-by":"crossref","unstructured":"Norouzi M (2009) Convolutional restricted Boltzmann machines for feature learning. Ph.D. thesis. School of Computing Science-Simon Fraser University","DOI":"10.1109\/CVPRW.2009.5206577"},{"key":"696_CR104","doi-asserted-by":"crossref","unstructured":"Norouzi M, Ranjbar M, Mori G (2009) Stacks of convolutional restricted boltzmann machines for shift-invariant feature learning. In: 2009 IEEE conference on computer vision and pattern recognition, IEEE, pp 2735\u20132742","DOI":"10.1109\/CVPR.2009.5206577"},{"key":"696_CR105","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.jocs.2015.04.014","volume":"9","author":"JP Papa","year":"2015","unstructured":"Papa JP, Rosa GH, Marana AN, Scheirer W, Cox DD (2015) Model selection for discriminative restricted boltzmann machines through meta-heuristic techniques. J Comput Sci 9:14\u201318","journal-title":"J Comput Sci"},{"key":"696_CR106","doi-asserted-by":"crossref","unstructured":"Parvat A, Chavan J, Kadam S, Dev S, Pathak V (2017) A survey of deep-learning frameworks. In: 2017 international conference on inventive systems and control (ICISC), IEEE, pp 1\u20137","DOI":"10.1109\/ICISC.2017.8068684"},{"key":"696_CR107","doi-asserted-by":"crossref","unstructured":"Perozzi B, Al-Rfou R, Skiena S (2014) Deepwalk: Online learning of social representations. In: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp 701\u2013710","DOI":"10.1145\/2623330.2623732"},{"key":"696_CR108","doi-asserted-by":"crossref","unstructured":"Pierri F, Piccardi C, Ceri S (2020) A multi-layer approach to disinformation detection on twitter. arXiv preprint arXiv:2002.12612","DOI":"10.1140\/epjds\/s13688-020-00253-8"},{"key":"696_CR109","doi-asserted-by":"crossref","unstructured":"Popat K, Mukherjee S, Yates A, Weikum G (2018) Declare: debunking fake news and false claims using evidence-aware deep learning. arXiv preprint arXiv:1809.06416","DOI":"10.18653\/v1\/D18-1003"},{"key":"696_CR110","doi-asserted-by":"crossref","unstructured":"Pouyanfar S, Chen SC (2016) Semantic event detection using ensemble deep learning. In: 2016 IEEE international symposium on multimedia (ISM), IEEE, pp 203\u2013208","DOI":"10.1109\/ISM.2016.0048"},{"key":"696_CR111","first-page":"92","volume":"51","author":"S Pouyanfar","year":"2018","unstructured":"Pouyanfar S, Sadiq S, Yan Y, Tian H, Tao Y, Reyes MP, Shyu ML, Chen SC, Iyengar S (2018) A survey on deep learning: algorithms, techniques, and applications. ACM Comput Surv 51:92","journal-title":"ACM Comput Surv"},{"key":"696_CR112","doi-asserted-by":"crossref","unstructured":"Prova AA, Akter T, Islam MR, Uddin MR, Hossain T, Hannan M, Hossain MS (2019) Analysis of online marketplace data on social networks using lstm. In: 2019 5th international conference on advances in electrical engineering (ICAEE), IEEE, pp 381\u2013385","DOI":"10.1109\/ICAEE48663.2019.8975591"},{"key":"696_CR113","unstructured":"Qazvinian V, Rosengren E, Radev DR, Mei Q (2011) Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the conference on empirical methods in natural language processing, Association for. Computational Linguistics, pp 1589\u20131599"},{"key":"696_CR114","doi-asserted-by":"crossref","unstructured":"Qian F, Gong C, Sharma K, Liu Y (2018) Neural user response generator: Fake news detection with collective user intelligence. In: IJCAI, pp 3834\u20133840","DOI":"10.24963\/ijcai.2018\/533"},{"key":"696_CR115","doi-asserted-by":"crossref","first-page":"1721","DOI":"10.1016\/j.eswa.2007.08.093","volume":"35","author":"JT Quah","year":"2008","unstructured":"Quah JT, Sriganesh M (2008) Real-time credit card fraud detection using computational intelligence. Expert Syst Appl 35:1721\u20131732","journal-title":"Expert Syst Appl"},{"key":"696_CR116","doi-asserted-by":"crossref","unstructured":"Rayana S, Akoglu L (2015). Collective opinion spam detection: Bridging review networks and metadata. In: Proceedings of the 21th acm sigkdd international conference on knowledge discovery and data mining, pp 985\u2013994","DOI":"10.1145\/2783258.2783370"},{"key":"696_CR117","unstructured":"Roy A, Basak K, Ekbal A, Bhattacharyya P (2018) A deep ensemble framework for fake news detection and classification. arXiv preprint arXiv:1811.04670"},{"key":"696_CR118","doi-asserted-by":"crossref","unstructured":"Ruchansky N, Seo S, Liu Y (2017) Csi: A hybrid deep model for fake news detection. In: Proceedings of the 2017 ACM on conference on information and knowledge management, ACM, pp 797\u2013806","DOI":"10.1145\/3132847.3132877"},{"key":"696_CR119","doi-asserted-by":"crossref","unstructured":"Saberi A, Vahidi M, Bidgoli BM (2007) Learn to detect phishing scams using learning and ensemble? methods. In: 2007 IEEE\/WIC\/ACM international conferences on web intelligence and intelligent agent technology-workshops, IEEE, pp 311\u2013314","DOI":"10.1109\/WI-IATW.2007.79"},{"key":"696_CR120","doi-asserted-by":"crossref","unstructured":"Sampson J, Morstatter F, Wu L, Liu H (2016) Leveraging the implicit structure within social media for emergent rumor detection. In: Proceedings of the 25th ACM international on conference on information and knowledge management, pp 2377\u20132382","DOI":"10.1145\/2983323.2983697"},{"key":"696_CR121","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.socnet.2014.05.002","volume":"39","author":"D Savage","year":"2014","unstructured":"Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Soc Netw 39:62\u201370","journal-title":"Soc Netw"},{"key":"696_CR122","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1080\/19393555.2018.1456577","volume":"27","author":"S Selvaganapathy","year":"2018","unstructured":"Selvaganapathy S, Nivaashini M, Natarajan H (2018) Deep belief network based detection and categorization of malicious urls. Inf Secur J Global Perspect 27:145\u2013161","journal-title":"Inf Secur J Global Perspect"},{"key":"696_CR123","doi-asserted-by":"crossref","unstructured":"Shahariar G, Biswas S, Omar F, Shah FM, Hassan SB (2019) Spam review detection using deep learning. In: 2019 IEEE 10th annual information technology, electronics and mobile communication conference (IEMCON), IEEE, pp 0027\u20130033","DOI":"10.1109\/IEMCON.2019.8936148"},{"key":"696_CR124","doi-asserted-by":"crossref","unstructured":"Sharma K, Qian F, Jiang H, Ruchansky N, Zhang M, Liu Y (2019) Combating fake news: a survey on identification and mitigation techniques. arXiv preprint arXiv:1901.06437","DOI":"10.1145\/3305260"},{"key":"696_CR125","doi-asserted-by":"crossref","unstructured":"Shi S, Wang Q, Chu X (2018) Performance modeling and evaluation of distributed deep learning frameworks on gpus. In: 2018 IEEE 16th international conference on dependable, autonomic and secure computing, 16th international conference on pervasive intelligence and computing, 4th international conference on big data intelligence and computing and cyber science and technology congress (DASC\/PiCom\/DataCom\/CyberSciTech), IEEE, pp 949\u2013957","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.000-4"},{"key":"696_CR126","doi-asserted-by":"crossref","unstructured":"Shu K, Cui L, Wang S, Lee D, Liu H (2019a) defend: Explainable fake news detection. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery and data mining, pp 395\u2013405","DOI":"10.1145\/3292500.3330935"},{"key":"696_CR127","unstructured":"Shu K, Mahudeswaran D, Wang S, Lee D, Liu H (2018) Fakenewsnet: a data repository with news content, social context and dynamic information for studying fake news on social media. arXiv preprint arXiv:1809.01286"},{"key":"696_CR128","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu K, Sliva A, Wang S, Tang J, Liu H (2017) Fake news detection on social media: a data mining perspective. ACM SIGKDD Explor Newslett 19:22\u201336","journal-title":"ACM SIGKDD Explor Newslett"},{"key":"696_CR129","doi-asserted-by":"crossref","unstructured":"Shu K, Wang S, Lee D, Liu H (2020) Mining disinformation and fake news: concepts, methods, and recent advancements. arXiv preprint arXiv:2001.00623","DOI":"10.1007\/978-3-030-42699-6_1"},{"key":"696_CR130","doi-asserted-by":"crossref","unstructured":"Shu K, Wang S, Liu H (2019b) Beyond news contents: The role of social context for fake news detection. In: Proceedings of the twelfth ACM international conference on web search and data mining, pp 312\u2013320","DOI":"10.1145\/3289600.3290994"},{"key":"696_CR131","doi-asserted-by":"crossref","unstructured":"Shu K, Zhou X, Wang S, Zafarani R, Liu H (2019c) The role of user profiles for fake news detection. In: Proceedings of the 2019 IEEE\/ACM international conference on advances in social networks analysis and mining, pp 436\u2013439","DOI":"10.1145\/3341161.3342927"},{"key":"696_CR132","unstructured":"Silva L, Ribeiro P, Rosa G, Costa K, Papa JP (2015) Parameter setting-free harmony search optimization of restricted boltzmann machines and its applications to spam detection. In: 12th international conference applied computing, pp 142\u2013150"},{"key":"696_CR133","unstructured":"da\u00a0Silva LA, da\u00a0Costa KAP, Ribeiro PB, de\u00a0Rosa GH, Papa JP (2016) Learning spam features using restricted boltzmann machines. IADIS International Journal on Computer Science & Information Systems 11"},{"key":"696_CR134","first-page":"68","volume":"20","author":"C Silverman","year":"2016","unstructured":"Silverman C, Strapagiel L, Shaban H, Hall E, Singer-Vine J (2016) Hyperpartisan facebook pages are publishing false and misleading information at an alarming rate. Buzzfeed News 20:68","journal-title":"Buzzfeed News"},{"key":"696_CR135","doi-asserted-by":"crossref","unstructured":"Socher R, Perelygin A, Wu J, Chuang J, Manning CD, Ng A, Potts C (2013) Recursive deep models for semantic compositionality over a sentiment treebank. In: Proceedings of the 2013 conference on empirical methods in natural language processing, pp 1631\u20131642","DOI":"10.18653\/v1\/D13-1170"},{"key":"696_CR136","unstructured":"Srivastava N, Salakhutdinov RR (2012) Multimodal learning with deep boltzmann machines. In: Advances in neural information processing systems, pp 2222\u20132230"},{"key":"696_CR137","first-page":"1","volume":"5","author":"X Sun","year":"2018","unstructured":"Sun X, Zhang C, Ding S, Quan C (2018) Detecting anomalous emotion through big data from social networks based on a deep learning method. Multimedia Tools Appl 5:1\u201322","journal-title":"Multimedia Tools Appl"},{"key":"696_CR138","unstructured":"Tacchini E, Ballarin G, Della\u00a0Vedova ML, Moret S, de\u00a0Alfaro L (2017) Some like it hoax: automated fake news detection in social networks. arXiv preprint arXiv:1704.07506"},{"key":"696_CR139","doi-asserted-by":"crossref","unstructured":"Tang D, Qin B, Liu T (2015) Document modeling with gated recurrent neural network for sentiment classification. In: Proceedings of the 2015 conference on empirical methods in natural language processing, pp 1422\u20131432","DOI":"10.18653\/v1\/D15-1167"},{"key":"696_CR140","doi-asserted-by":"crossref","unstructured":"Tschiatschek S, Singla A, Gomez\u00a0Rodriguez M, Merchant A, Krause A (2018) Fake news detection in social networks via crowd signals. In: Companion of the the web conference 2018 on the web conference 2018, international world wide web conferences steering committee, pp 517\u2013524","DOI":"10.1145\/3184558.3188722"},{"key":"696_CR141","unstructured":"Tsui D (2017) Predicting stock price movement using social media analysis. Technical Report. Stanford University, Technical Report"},{"key":"696_CR142","doi-asserted-by":"crossref","unstructured":"Tzortzis G, Likas A (2007) Deep belief networks for spam filtering. In: 19th IEEE international conference on tools with artificial intelligence (ICTAI 2007), IEEE, pp 306\u2013309","DOI":"10.1109\/ICTAI.2007.65"},{"key":"696_CR143","unstructured":"Van\u00a0Merri\u00ebnboer B, Bahdanau D, Dumoulin V, Serdyuk D, Warde-Farley D, Chorowski J, Bengio Y (2015) Blocks and fuel: frameworks for deep learning. arXiv preprint arXiv:1506.00619"},{"key":"696_CR144","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/s13278-014-0166-8","volume":"4","author":"A Vartapetiance","year":"2014","unstructured":"Vartapetiance A, Gillam L (2014) Deception detection: dependable or defective? Soc Netw Anal Min 4:166","journal-title":"Soc Netw Anal Min"},{"key":"696_CR145","doi-asserted-by":"crossref","unstructured":"Vlachos A, Riedel S (2014) Fact checking: Task definition and dataset construction. In: Proceedings of the ACL 2014 workshop on language technologies and computational social science, pp 18\u201322","DOI":"10.3115\/v1\/W14-2508"},{"key":"696_CR146","doi-asserted-by":"crossref","first-page":"113097","DOI":"10.1016\/j.dss.2019.113097","volume":"124","author":"NN Vo","year":"2019","unstructured":"Vo NN, He X, Liu S, Xu G (2019) Deep learning for decision making and the optimization of socially responsible investments and portfolio. Decis Support Syst 124:113097","journal-title":"Decis Support Syst"},{"key":"696_CR147","doi-asserted-by":"crossref","unstructured":"Vo NN, Liu S, He X, Xu G (2018) Multimodal mixture density boosting network for personality mining. In: Pacific-Asia conference on knowledge discovery and data mining, Springer. pp 644\u2013655","DOI":"10.1007\/978-3-319-93034-3_51"},{"key":"696_CR148","doi-asserted-by":"crossref","unstructured":"Wang D, Irani D, Pu C (2011) A social-spam detection framework. In: Proceedings of the 8th annual collaboration, electronic messaging, anti-abuse and Spam conference, pp 46\u201354","DOI":"10.1145\/2030376.2030382"},{"key":"696_CR149","unstructured":"Wang N, Yeung DY (2013) Learning a deep compact image representation for visual tracking. In: Advances in neural information processing systems, pp 809\u2013817"},{"key":"696_CR150","first-page":"72","volume":"9","author":"W Wang","year":"2019","unstructured":"Wang W, Zhang F, Luo X, Zhang S (2019) Pdrcnn: precise phishing detection with recurrent convolutional neural networks. Secur Commun Netw 9:72","journal-title":"Secur Commun Netw"},{"key":"696_CR151","doi-asserted-by":"crossref","unstructured":"Wang WY (2017) \u201c liar, liar pants on fire\u201d: a new benchmark dataset for fake news detection. arXiv preprint arXiv:1705.00648","DOI":"10.18653\/v1\/P17-2067"},{"key":"696_CR152","doi-asserted-by":"crossref","unstructured":"Wang Y, Ma F, Jin Z, Yuan Y, Xun G, Jha K, Su L, Gao J (2018) Eann: Event adversarial neural networks for multi-modal fake news detection. In: Proceedings of the 24th ACM sigkdd international conference on knowledge discovery and data mining, pp 849\u2013857","DOI":"10.1145\/3219819.3219903"},{"key":"696_CR153","doi-asserted-by":"crossref","unstructured":"Wei L, Gao D, Luo C (2018) False data injection attacks detection with deep belief networks in smart grid. In: 2018 Chinese automation congress (CAC), IEEE, pp 2621\u20132625","DOI":"10.1109\/CAC.2018.8623514"},{"key":"696_CR154","doi-asserted-by":"crossref","unstructured":"Wei W, Wan X (2017) Learning to identify ambiguous and misleading news headlines. arXiv preprint arXiv:1705.06031","DOI":"10.24963\/ijcai.2017\/583"},{"key":"696_CR155","unstructured":"Willmore A (xxxx) This analysis shows how viral fake election news stories outperformed real news on facebook"},{"key":"696_CR156","doi-asserted-by":"crossref","unstructured":"Wu L, Li J, Hu X, Liu H (2017) Gleaning wisdom from the past: Early detection of emerging rumors in social media. In: Proceedings of the 2017 SIAM international conference on data mining, SIAM, pp 99\u2013107","DOI":"10.1137\/1.9781611974973.12"},{"key":"696_CR157","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/3373464.3373475","volume":"21","author":"L Wu","year":"2019","unstructured":"Wu L, Morstatter F, Carley KM, Liu H (2019) Misinformation in social media: definition, manipulation, and detection. ACM SIGKDD Explor Newslett 21:80\u201390","journal-title":"ACM SIGKDD Explor Newslett"},{"key":"696_CR158","doi-asserted-by":"crossref","unstructured":"Wu L, Rao Y, Yu H, Wang Y, Nazir A (2018) False information detection on social media via a hybrid deep model. In: International conference on social informatics, Springer, pp 323\u2013333","DOI":"10.1007\/978-3-030-01159-8_31"},{"key":"696_CR159","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.3390\/sym11111408","volume":"11","author":"Y Xu","year":"2019","unstructured":"Xu Y, Wang C, Dan Z, Sun S, Dong F (2019) Deep recurrent neural network and data filtering for rumor detection on sina weibo. Symmetry 11:1408","journal-title":"Symmetry"},{"key":"696_CR160","unstructured":"Yang Y, Zheng L, Zhang J, Cui Q, Li Z, Yu PS (2018) Ti-cnn: Convolutional neural networks for fake news detection. arXiv preprint arXiv:1806.00749"},{"key":"696_CR161","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s41060-017-0088-4","volume":"6","author":"H Yenala","year":"2018","unstructured":"Yenala H, Jhanwar A, Chinnakotla MK, Goyal J (2018) Deep learning for detecting inappropriate content in text. Int J Data Sci Anal 6:273\u2013286","journal-title":"Int J Data Sci Anal"},{"key":"696_CR162","unstructured":"Yepes AJ, MacKinlay A, Bedo J, Garvani R, Chen Q (2014) Deep belief networks and biomedical text categorisation. In: Proceedings of the Australasian language technology association. Workshop, pp 123\u2013127"},{"key":"696_CR163","doi-asserted-by":"crossref","unstructured":"Yilmaz CM, Durahim AO (2018) Spr2ep: a semi-supervised spam review detection framework. In: 2018 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 306\u2013313","DOI":"10.1109\/ASONAM.2018.8508314"},{"key":"696_CR164","doi-asserted-by":"crossref","unstructured":"Yin J, Zhou Z, Liu S, Wu Z, Xu G (2018) Social spammer detection: a multi-relational embedding approach. In: Pacific-Asia conference on knowledge discovery and data mining, Springer, pp 615\u2013627","DOI":"10.1007\/978-3-319-93034-3_49"},{"key":"696_CR0165","doi-asserted-by":"crossref","unstructured":"Yin J, Li Q, Liu S, Wu Z, Xu G (2020) Leveraging Multi-level Dependency of Relational Sequences for Social Spammer Detection. arXiv preprint arXiv:2009.06231","DOI":"10.1016\/j.neucom.2020.10.070"},{"key":"696_CR165","doi-asserted-by":"crossref","unstructured":"Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. In: IEEE computational intelligence magazine, vol 13, pp 55\u201375","DOI":"10.1109\/MCI.2018.2840738"},{"key":"696_CR166","doi-asserted-by":"crossref","unstructured":"Yu F, Liu Q, Wu S, Wang L, Tan T et\u00a0al. (2017a) A convolutional approach for misinformation identification","DOI":"10.24963\/ijcai.2017\/545"},{"key":"696_CR167","doi-asserted-by":"crossref","unstructured":"Yu S, Li M, Liu F (2017b) Rumor identification with maximum entropy in micronet. Complexity 2017","DOI":"10.1155\/2017\/1703870"},{"key":"696_CR168","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2885494","volume":"34","author":"H Zhang","year":"2016","unstructured":"Zhang H, Alim MA, Li X, Thai MT, Nguyen HT (2016) Misinformation in online social networks: detect them all with a limited budget. ACM Trans Inf Syst 34:1\u201324","journal-title":"ACM Trans Inf Syst"},{"key":"696_CR169","doi-asserted-by":"crossref","unstructured":"Zhang H, Kuhnle A, Smith JD, Thai MT (2018a) Fight under uncertainty: Restraining misinformation and pushing out the truth. In: 2018 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 266\u2013273","DOI":"10.1109\/ASONAM.2018.8508402"},{"key":"696_CR170","unstructured":"Zhang J, Cui L, Fu Y, Gouza FB (2018b) Fake news detection with deep diffusive network model. arXiv preprint arXiv:1805.08751"},{"key":"696_CR171","doi-asserted-by":"crossref","unstructured":"Zhang Q, Lipani A, Liang S, Yilmaz E (2019) Reply-aided detection of misinformation via bayesian deep learning. In: The world wide web conference, pp 2333\u20132343","DOI":"10.1145\/3308558.3313718"},{"key":"696_CR172","doi-asserted-by":"crossref","unstructured":"Zhang Q, Zhang S, Dong J, Xiong J, Cheng X (2015) Automatic detection of rumor on social network. In: Natural language processing and Chinese computing. Springer, pp 113\u2013122","DOI":"10.1007\/978-3-319-25207-0_10"},{"key":"696_CR173","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1016\/j.ipm.2018.03.007","volume":"54","author":"W Zhang","year":"2018","unstructured":"Zhang W, Du Y, Yoshida T, Wang Q (2018c) Dri-rcnn: an approach to deceptive review identification using recurrent convolutional neural network. Inf Process Manag 54:576\u2013592","journal-title":"Inf Process Manag"},{"key":"696_CR174","doi-asserted-by":"crossref","unstructured":"Zhang Y, Salakhutdinov R, Chang HA, Glass J (2012) Resource configurable spoken query detection using deep boltzmann machines. In: 2012 IEEE international conference on acoustics. Speech and signal processing (ICASSP), IEEE, pp 5161\u20135164","DOI":"10.1109\/ICASSP.2012.6289082"},{"key":"696_CR175","doi-asserted-by":"crossref","first-page":"1773","DOI":"10.1109\/TVCG.2014.2346922","volume":"20","author":"J Zhao","year":"2014","unstructured":"Zhao J, Cao N, Wen Z, Song Y, Lin YR, Collins C (2014) Fluxflow: visual analysis of anomalous information spreading on social media. IEEE Trans Visual Comput Graphics 20:1773\u20131782","journal-title":"IEEE Trans Visual Comput Graphics"},{"key":"696_CR176","doi-asserted-by":"crossref","unstructured":"Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: Early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th international conference on world wide web, pp 1395\u20131405","DOI":"10.1145\/2736277.2741637"},{"key":"696_CR177","unstructured":"Zhou C, Sun C, Liu Z, Lau F (2015) A c-lstm neural network for text classification. arXiv preprint arXiv:1511.08630"},{"key":"696_CR178","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3161603","volume":"51","author":"A Zubiaga","year":"2018","unstructured":"Zubiaga A, Aker A, Bontcheva K, Liakata M, Procter R (2018) Detection and resolution of rumours in social media: a survey. ACM Comput Surv 51:1\u201336","journal-title":"ACM Comput Surv"},{"key":"696_CR179","unstructured":"Zubiaga A, Kochkina E, Liakata M, Procter R, Lukasik M (2016a) Stance classification in rumours as a sequential task exploiting the tree structure of social media conversations. arXiv preprint arXiv:1609.09028"},{"key":"696_CR180","doi-asserted-by":"crossref","unstructured":"Zubiaga A, Liakata M, Procter R (2017) Exploiting context for rumour detection in social media. In: International conference on social informatics, Springer, pp 109\u2013123","DOI":"10.1007\/978-3-319-67217-5_8"},{"key":"696_CR181","doi-asserted-by":"crossref","first-page":"e0150989","DOI":"10.1371\/journal.pone.0150989","volume":"11","author":"A Zubiaga","year":"2016","unstructured":"Zubiaga A, Liakata M, Procter R, Hoi GWS, Tolmie P (2016b) Analysing how people orient to and spread rumours in social media by looking at conversational threads. PLoS ONE 11:e0150989","journal-title":"PLoS ONE"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-00696-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-020-00696-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-00696-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T06:11:28Z","timestamp":1744179088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-020-00696-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,29]]},"references-count":182,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["696"],"URL":"https:\/\/doi.org\/10.1007\/s13278-020-00696-x","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,29]]},"assertion":[{"value":"28 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"82"}}