{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:06:38Z","timestamp":1778346398656,"version":"3.51.4"},"reference-count":135,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s13278-022-00951-3","type":"journal-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:37:13Z","timestamp":1662410233000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":114,"title":["Detection and moderation of detrimental content on social media platforms: current status and future directions"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8332-5630","authenticated-orcid":false,"given":"Vaishali U.","family":"Gongane","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3144-8487","authenticated-orcid":false,"given":"Mousami V.","family":"Munot","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2555-9380","authenticated-orcid":false,"given":"Alwin D.","family":"Anuse","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"key":"951_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed H, Traore I, Saad S (2017) Detection of online fake news using N-Gram analysis and machine learning techniques. In: Traore I, Woungang I, Awad A (eds) Intelligent, secure, and dependable systems in distributed and cloud environments. ISDDC. Lecture Notes in Computer Science, Vol. 10618, pp 127\u2013138. https:\/\/doi.org\/10.1007\/978-3-319-69155-8_9.","DOI":"10.1007\/978-3-319-69155-8_9"},{"key":"951_CR2","doi-asserted-by":"publisher","unstructured":"Amrutha BR, Bindu KR (2019) Detecting hate speech in tweets using different deep neural network architectures. In: Proceedings of the international conference on intelligent computing and control systems (ICICCS 2019) IEEE, pp 923\u2013926. https:\/\/doi.org\/10.1109\/ICCS45141.2019.9065763.","DOI":"10.1109\/ICCS45141.2019.9065763"},{"key":"951_CR3","doi-asserted-by":"crossref","unstructured":"Andersen JS, Zukunft O, Maalej W (2021) REM: efficient semi-automated real-time moderation of online forums. In: Proceedings of the joint conference of the 59th annual meeting of the association for computational linguistics and the 11th international joint conference on natural language processing: system demonstrations. pp 142\u2013149.","DOI":"10.18653\/v1\/2021.acl-demo.17"},{"key":"951_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100311","author":"FE Ayo","year":"2020","unstructured":"Ayo FE, Folorunso O, Ibharalu FT, Osinuga IA (2020) Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions. Comput Sci Rev Elsevier. https:\/\/doi.org\/10.1016\/j.cosrev.2020.100311","journal-title":"Comput Sci Rev Elsevier"},{"key":"951_CR5","doi-asserted-by":"publisher","unstructured":"Badjatiya P, Gupta S, Gupta M, Varma V (2017) Deep learning for hate speech detection in tweets. In: 26th international conference on world wide web companion, Perth, Australia, pp 759\u2013760. https:\/\/doi.org\/10.1145\/3041021.3054223.","DOI":"10.1145\/3041021.3054223"},{"key":"951_CR6","unstructured":"Barrett PM (2020) Who moderates the social media giants? A call to end outsourcing. report: NYU Stern Center Centre for Business and Human Rights."},{"key":"951_CR7","doi-asserted-by":"publisher","unstructured":"Basile V, Bosco C, Fersini E, Nozza D, Patti V, Pardo FMR, Rosso P, Sanguinetti M (2019) Semeval-2019 task 5: Multilingual detection of hate speech against immigrants and women in twitter. In: Proceedings of the 13th international workshop on semantic evaluation, pp 54\u201363. https:\/\/doi.org\/10.18653\/v1\/S19-2007.","DOI":"10.18653\/v1\/S19-2007"},{"key":"951_CR8","doi-asserted-by":"publisher","unstructured":"Bender EM, Gebru T, Shmitchell S, McMillan A (2021) On the dangers of stochastic parrots: can language models be too big? In: Proceedings of the 2021 ACM conference on fairness, accountability, and transparency, pp 610\u2013623. https:\/\/doi.org\/10.1145\/3442188.3445922.","DOI":"10.1145\/3442188.3445922"},{"key":"951_CR9","unstructured":"Boididou C, Papadopoulos S, Nguyen DT, Boato G, Kompatsiaris Y(2015) The certh-unitn participation@ verifying multimedia use 2015. Verifying multimedia use at MediaEval 2015. In: MediaEval benchmarking initiative for multimedia evaluation."},{"key":"951_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski P, Grave E, Joulin A, Mikolov T (2017) Enriching word vectors with subword information. Trans Assoc Comput Linguistics 5:135\u2013146. https:\/\/doi.org\/10.1162\/tacl_a_00051","journal-title":"Trans Assoc Comput Linguistics"},{"key":"951_CR11","doi-asserted-by":"publisher","unstructured":"Bonet OG, Miguel NP, Garcia-Pablos A, Cuadros M (2018) Hate speech dataset from a white supremacy forum. In: 2nd workshop on abusive language online @ EMNLP. https:\/\/doi.org\/10.18653\/v1\/W18-5102.","DOI":"10.18653\/v1\/W18-5102"},{"key":"951_CR12","unstructured":"Brown TB et al (2020). Language models are few-shot learners. arXiv:2005.14165v4 [cs.CL]"},{"key":"951_CR13","doi-asserted-by":"crossref","unstructured":"Burfoot C, BaldwinT (2009) Automatic satire detection: are you having a laugh? In: Proceedings of the ACL-IJCNLP 2009 conference short papers, pp 161\u2013164.","DOI":"10.3115\/1667583.1667633"},{"issue":"2","key":"951_CR14","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/poi3.85","volume":"7","author":"P Burnap","year":"2015","unstructured":"Burnap P, Williams ML (2015) Cyber hate speech on twitter: an application of machine classification and statistical modeling for policy and decision making. Policy Internet 7(2):223\u201342. https:\/\/doi.org\/10.1002\/poi3.85","journal-title":"Policy Internet"},{"key":"951_CR15","doi-asserted-by":"crossref","unstructured":"Cao J, Qi P, Sheng Q, Yang T, Guo J, Li J (2020) Exploring the role of visual content in fake news detection. arXiv:2003.05096v1 [cs.MM].","DOI":"10.1007\/978-3-030-42699-6_8"},{"key":"951_CR16","doi-asserted-by":"publisher","unstructured":"Chakraborty A, Paranjape B, Kakarla S, Ganguly N (2016) Stop clickbait: Detecting and preventing clickbaits in online news media. In: IEEE\/ACM international conference on advances in social networks analysis and mining, pp 9\u201316. https:\/\/doi.org\/10.1109\/ASONAM.2016.7752207.","DOI":"10.1109\/ASONAM.2016.7752207"},{"key":"951_CR17","doi-asserted-by":"publisher","unstructured":"Cheng L, Li J, Silva Y, Hall D, Liu H (2019) Xbully: cyberbullying detection within a multi-modal context. In: Proceedings of the twelfth ACM international conference on web search and data mining, pp 339\u2013347. https:\/\/doi.org\/10.1145\/3289600.3291037.","DOI":"10.1145\/3289600.3291037"},{"key":"951_CR18","doi-asserted-by":"publisher","unstructured":"Chung YL, Kuzmenko E, Tekiroglu SS, Guerini M (2019) CONAN\u2013COunter NArratives through Nichesourcing: a multilingual dataset of responses to fight online hate speech. In: Proceedings of the 57th annual meeting of the association for computational linguistics, pp 2819\u20132829. https:\/\/doi.org\/10.18653\/v1\/P19-1271.","DOI":"10.18653\/v1\/P19-1271"},{"key":"951_CR19","doi-asserted-by":"publisher","DOI":"10.2861\/677679","author":"C Colomina","year":"2021","unstructured":"Colomina C, Margalef HS, Youngs R (2021) The impact of disinformation on democratic processes and human rights in the world. Policy Depart Director-General External Policies. https:\/\/doi.org\/10.2861\/677679","journal-title":"Policy Depart Director-General External Policies"},{"key":"951_CR20","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2020.1733762","author":"MF Common","year":"2020","unstructured":"Common MF (2020) Fear the Reaper: how content moderation rules are enforced on social media. Int Rev Law Comput Technol. https:\/\/doi.org\/10.1080\/13600869.2020.1733762","journal-title":"Int Rev Law Comput Technol"},{"issue":"3","key":"951_CR21","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1177\/1461444814543163","volume":"18","author":"K Crawford","year":"2016","unstructured":"Crawford K, Gillespie T (2016) What is a flag for? social media reporting tools and the vocabulary of complaint. New Media Soc 18(3):410\u2013428. https:\/\/doi.org\/10.1177\/1461444814543163","journal-title":"New Media Soc"},{"key":"951_CR22","unstructured":"Cui L, Lee D (2020) CoAID: COVID-19 healthcare misinformation dataset. arXiv:2006.00885"},{"key":"951_CR23","doi-asserted-by":"publisher","unstructured":"Cui L, Wang S, Lee D (2019) SAME: sentiment-aware multi-modal embedding for detecting fake news. IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 41\u201348. https:\/\/doi.org\/10.1145\/3341161.3342894.","DOI":"10.1145\/3341161.3342894"},{"issue":"3","key":"951_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102481","volume":"58","author":"Cunha","year":"2021","unstructured":"Cunha et al (2021) On the cost-effectiveness of neural and non-neural approaches and representations for text classification: A comprehensive comparative study. Inf Process Manag 58(3):102481","journal-title":"Inf Process Manag"},{"key":"951_CR25","doi-asserted-by":"crossref","unstructured":"Danilevsky M, Qian K, Aharonov R, Katasis Y, Kawas B, Sen P (2020) A Survey of the state of explainable AI for natural language processing. arXiv: 2010.00711v1 [cs.CL].","DOI":"10.18653\/v1\/2020.aacl-main.46"},{"key":"951_CR26","doi-asserted-by":"crossref","unstructured":"Davidson T, Warmsley D, Macy M, Weber I (2017) Automated hate speech detection and the problem of offensive language. In: Proceedings of the 11th international AAAI social media, ICWSM \u2019, vol 17, 512\u2013515.","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"951_CR27","unstructured":"Devlin J, Chang M, Lee K, Toutanova K (2019). BERT: pre-training of deep bidirectional transformers for language understanding. arXiv:1810.04805."},{"key":"951_CR28","doi-asserted-by":"crossref","unstructured":"Dinakar K, Reichart R, Lieberman H (2011) Modeling the detection of textual cyberbullying. In: Fifth international AAAI conference on weblogs and social media, pp 11\u201317.","DOI":"10.1609\/icwsm.v5i3.14209"},{"key":"951_CR29","unstructured":"Duarte N, Llanso E, Loup A (2017) Mixed Messages? The limits of automated social media content analysis."},{"key":"951_CR30","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1007\/978-3-030-33509-0_86","volume":"96","author":"MK Elhadad","year":"2020","unstructured":"Elhadad MK, Li KF, Gebali F (2020) A novel approach for selecting hybrid features from online news textual metadata for fake news detection. 3PGCIC 2019. LNNS 96:914\u2013925. https:\/\/doi.org\/10.1007\/978-3-030-33509-0_86","journal-title":"LNNS"},{"issue":"1","key":"951_CR31","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"NB Ellison","year":"2007","unstructured":"Ellison NB (2007) Social network sites: Definition, history, and scholarship. J Computer-Mediated Commun 13(1):210\u2013230","journal-title":"J Computer-Mediated Commun"},{"issue":"4","key":"951_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3232676","volume":"51","author":"P Fortuna","year":"2018","unstructured":"Fortuna P, Nunes S (2018) A survey on automatic detection of hate speech in text. ACM Comput Surv 51(4):1\u201330. https:\/\/doi.org\/10.1145\/3232676","journal-title":"ACM Comput Surv"},{"key":"951_CR33","doi-asserted-by":"publisher","unstructured":"Gamb\u00e4ck B, Sikdar UK (2017) Using convolutional neural networks to classify hate-speech. In: Proceedings of the first workshop on abusive language online, pp 85\u201390. https:\/\/doi.org\/10.18653\/v1\/W17-3013.","DOI":"10.18653\/v1\/W17-3013"},{"issue":"1","key":"951_CR34","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1002\/poi3.236","volume":"2","author":"B Ganesh","year":"2020","unstructured":"Ganesh B, Jonathan B (2020) Countering extremists on social media: challenges for strategic communication and content moderation. Policy Internet 2(1):6\u201319. https:\/\/doi.org\/10.1002\/poi3.236","journal-title":"Policy Internet"},{"key":"951_CR35","unstructured":"Gibbs S (2017) Facebook live: Zuckerberg adds 3000 moderators in wake of murders. https:\/\/www.theguardian.com\/technology\/2017\/may\/03\/facebook-live-zuckerberg-adds-3000-moderators-murders. Accessed 17 October 2021."},{"key":"951_CR36","volume-title":"Custodians of the internet: platforms, content moderation, and the hidden decisions that shape social media","author":"T Gillespie","year":"2018","unstructured":"Gillespie T (2018) Custodians of the internet: platforms, content moderation, and the hidden decisions that shape social media. Yale University Press, New Haven"},{"issue":"4","key":"951_CR37","doi-asserted-by":"publisher","first-page":"215","DOI":"10.14257\/ijmue.2015.10.4.21","volume":"10","author":"ND Gitari","year":"2015","unstructured":"Gitari ND, Zuping Z, Damien H, Long J(2015) A Lexicon-based Approach for Hate Speech Detection. In: International Journal of Multimedia and Ubiquitous Engineering Vol.10 (4): 215-230. https:\/\/doi.org\/10.14257\/ijmue.2015.10.4.21","journal-title":"Int J Multimed Ubiquitous Eng"},{"key":"951_CR38","doi-asserted-by":"publisher","unstructured":"Glazkova, A., Glazkov, M., Trifonov, T. (2021). g2tmn at Constraint@AAAI2021: Exploiting CT-BERT and Ensembling Learning for COVID-19 Fake News Detection. In: Chakraborty, T., Shu, K., Bernard, H.R., Liu, H., Akhtar, M.S. (eds) combating online hostile posts in regional languages during emergency situation. CONSTRAINT 2021. Communications in Computer and Information Science, vol 1402. Springer, Cham. doi: https:\/\/doi.org\/10.1007\/978-3-030-73696-5_12","DOI":"10.1007\/978-3-030-73696-5_12"},{"key":"951_CR39","doi-asserted-by":"publisher","unstructured":"Golbeck et al (2017) A large, labeled corpus for online harassment research. In: WebSci '17: proceedings of the 2017 ACM on web science conference, 229\u2013233. https:\/\/doi.org\/10.1145\/3091478.3091509.","DOI":"10.1145\/3091478.3091509"},{"key":"951_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106991","author":"MH Goldani","year":"2020","unstructured":"Goldani MH, Momtazi S, Safabakhsh R (2020a) Detecting fake news with capsule neural networks. Appl Soft Comput J. https:\/\/doi.org\/10.1016\/j.asoc.2020.106991","journal-title":"Appl Soft Comput J"},{"key":"951_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ipm.2020.102418","volume":"58","author":"MH Goldani","year":"2020","unstructured":"Goldani MH, Safabakhsh R, Momtazi S (2020b) Convolutional neural network with margin loss for fake news detection. Inf Process Manage 58:1\u201312. https:\/\/doi.org\/10.1016\/j.ipm.2020.102418","journal-title":"Inf Process Manage"},{"key":"951_CR42","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719897945","author":"R Gorwa","year":"2020","unstructured":"Gorwa R, Binns R, Katzenbach C (2020) Algorithmic content moderation: technical and political challenges in the automation of platform governance. Big Data Soc. https:\/\/doi.org\/10.1177\/2053951719897945","journal-title":"Big Data Soc"},{"key":"951_CR43","doi-asserted-by":"publisher","unstructured":"Granik M, Mesyura V (2017) Fake news detection using naive Bayes classifier. In: IEEE first Ukraine conference on electrical and computer engineering (UKRCON), pp 900\u2013903. https:\/\/doi.org\/10.1109\/UKRCON.2017.8100379.","DOI":"10.1109\/UKRCON.2017.8100379"},{"key":"951_CR44","doi-asserted-by":"publisher","DOI":"10.31228\/osf.io\/qwxf5","author":"J Grimmelmann","year":"2015","unstructured":"Grimmelmann J (2015) The virtues of moderation. Yale J Law Technol. https:\/\/doi.org\/10.31228\/osf.io\/qwxf5","journal-title":"Yale J Law Technol"},{"key":"951_CR45","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-030-36987-3_17","volume":"11969","author":"T Hamdi","year":"2020","unstructured":"Hamdi T, Slimi H, Bounhas I, Slimani Y (2020) A hybrid approach for fake news detection in twitter based on user features and graph embedding. ICDCIT 2020. LNCS 11969:266\u2013280. https:\/\/doi.org\/10.1007\/978-3-030-36987-3_17","journal-title":"LNCS"},{"issue":"6245","key":"951_CR46","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1126\/science.aaa8685","volume":"349","author":"J Hirschberg","year":"2015","unstructured":"Hirschberg J, Manning HD (2015) Advances in natural language processing. Science 349(6245):261\u2013266. https:\/\/doi.org\/10.1126\/science.aaa8685","journal-title":"Science"},{"key":"951_CR47","doi-asserted-by":"crossref","unstructured":"Horne BD, Adali S (2017) This just in: fake news packs a lot in title, uses simpler, repetitive content in text body, more similar to satire than real news. In: The workshops of the eleventh international AAAI conference on web and social media AAAI technical report WS-17, News and Public Opinion, pp 759\u2013766.","DOI":"10.1609\/icwsm.v11i1.14976"},{"key":"951_CR48","unstructured":"Hosseini H, Kannan S, Zhang B,Poovendran R (2017) Deceiving Google\u2019s perspective API built for detecting toxic comments. arXiv:1702.08138v1 [cs.LG]."},{"key":"951_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00696-x","author":"MdR Islam","year":"2020","unstructured":"Islam MdR, Liu S, Wang X, Xu G (2020) Deep learning for misinformation detection on online social networks: a survey and new perspectives. Social Netw Anal Mining. https:\/\/doi.org\/10.1007\/s13278-020-00696-x","journal-title":"Social Netw Anal Mining"},{"issue":"1","key":"951_CR50","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","volume":"53","author":"AM Kaplan","year":"2010","unstructured":"Kaplan AM, Haenlein M (2010) Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons 53(1):59\u201368","journal-title":"Business Horizons"},{"key":"951_CR51","doi-asserted-by":"publisher","unstructured":"Khattar D, Goud JS, Gupta M, Varma V(2019) MVAE: multimodal variational autoencoder for fake news detection. In: The World Wide Web conference (WWW '19). Association for computing machinery, New York, NY, USA, pp 2915\u20132921. https:\/\/doi.org\/10.1145\/3308558.3313552","DOI":"10.1145\/3308558.3313552"},{"key":"951_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102643","author":"J Koco\u0144","year":"2021","unstructured":"Koco\u0144 J, Figas A, Gruza M, Puchalska D, Kajdanowicz T, Kazienko P (2021) Offensive, aggressive, and hate speech analysis: from data-centric to human-centered approach. Inf Process Manag. https:\/\/doi.org\/10.1016\/j.ipm.2021.102643","journal-title":"Inf Process Manag"},{"key":"951_CR53","unstructured":"Koebler J, Cox J (2018) The impossible job: inside Facebook\u2019s struggle to moderate two billion people. https:\/\/www.vice.com\/en\/article\/how-facebook-content-moderation-works. Accessed on 25 October 2021."},{"key":"951_CR54","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1007\/978-3-030-85447-8_55","volume":"12896","author":"G Kumar","year":"2021","unstructured":"Kumar G, Singh JP, Kumar A (2021) A Deep Multi-modal neural network for the identification of hate speech from social media. IFIP Int Feder Inf Process LNCS 12896:670\u2013680. https:\/\/doi.org\/10.1007\/978-3-030-85447-8_55","journal-title":"IFIP Int Feder Inf Process LNCS"},{"key":"951_CR55","unstructured":"Kumar R, Ojha AK, Malmasi S, Zampieri M (2018) Benchmarking Aggression Identification in Social Media. In: Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying (TRAC-2018):1\u201311"},{"key":"951_CR56","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.future.2021.01.014","volume":"118","author":"K Kumari","year":"2021","unstructured":"Kumari K, Singh JP, Dwivedi YK, Rana NP (2021) Multi-modal aggression identification using convolutional neural network and binary particle swarm optimization. Future Gener Comput Syst 118:187\u2013197. https:\/\/doi.org\/10.1016\/j.future.2021.01.014","journal-title":"Future Gener Comput Syst"},{"key":"951_CR57","doi-asserted-by":"crossref","unstructured":"Kwok I, Wang Y (2013) Locate the hate: detecting tweets against blacks. In: Proceedings of the twenty-seventh AAAI conference on artificial intelligence, AAAI\u20192013, pp 1621\u20131622.","DOI":"10.1609\/aaai.v27i1.8539"},{"key":"951_CR58","unstructured":"Lan Z et al (2020). ALBERT: A LITE BERT for self-supervised learning of language representations. arXiv:1909.11942v6 [cs.CL]"},{"key":"951_CR59","unstructured":"Leerssen P, Hoboken J V, Harambon J, Lanso E (2020) Artificial Intelligence, Content Moderation, and Freedom of Expression, Transatlantic Working Group."},{"key":"951_CR60","unstructured":"Li L, Levi O, Hosseini P, Broniatowski D (2020). A multi-modal method for satire detection using textual and visual cues: In: Proceedings of the 3rd NLP4IF workshop on NLP for internet freedom: censorship, disinformation, and propaganda, barcelona, Spain (Online). International Committee on Computational Linguistics (ICCL), pp 33\u201338"},{"key":"951_CR61","unstructured":"Li L, Levi O, Hosseini P, Broniatowski DA (2021). A multi-modal method for satire detection using textual and visual cues. arXiv:2010.06671v1 [cs.CL]"},{"issue":"2","key":"951_CR62","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TCSS.2019.2892037","volume":"6","author":"H Liu","year":"2019","unstructured":"Liu H, Burnap P, Alorainy M, Williams ML (2019) A fuzzy approach to text classification with two-stage training for ambiguous instances. IEEE Trans Comput Soc Syst 6(2):227\u2013240. https:\/\/doi.org\/10.1109\/TCSS.2019.2892037","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"951_CR63","unstructured":"Liu Y et al (2019). RoBERTa: a robustly optimized BERT pretraining approach. arXiv:1907.11692v1 [cs.CL]"},{"key":"951_CR64","doi-asserted-by":"publisher","unstructured":"Ma J, Gao W, Wong KF (2019) Detect rumors on twitter by promoting information campaigns with generative adversarial learning. In: Proceedings of the 28th international conference on World Wide Web, ACM: 3049\u20133055. doi:https:\/\/doi.org\/10.1145\/3308558.3313741.","DOI":"10.1145\/3308558.3313741"},{"key":"951_CR65","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/0952813X.2017.1409284","volume":"30","author":"S Malmasi","year":"2018","unstructured":"Malmasi S, Zampieri M (2018) Challenges in discriminating profanity from hate speech. J Exp Theor Artif Intell 30:187\u2013202. https:\/\/doi.org\/10.1080\/0952813X.2017.1409284","journal-title":"J Exp Theor Artif Intell"},{"key":"951_CR66","doi-asserted-by":"publisher","unstructured":"Mandl T, Modha S, Majumder P, Patel D, Dave M, Mandlia C, Patel A (2019) Overview of the HASOC track at FIRE 2019: hate speech and offensive content identification in Indo-European languages. In: Proceedings of the 11th forum for information retrieval evaluation (FIRE '19). Association for Computing Machinery, New York, USA, pp 14\u201317. https:\/\/doi.org\/10.1145\/3368567.3368584.","DOI":"10.1145\/3368567.3368584"},{"key":"951_CR67","unstructured":"Mangalam K, Kumar A (2019) Section 66A: an unending saga of misuse and harassment. https:\/\/lawschoolpolicyreview.com\/2019\/06\/04\/"},{"key":"951_CR68","doi-asserted-by":"publisher","unstructured":"Mathur P, Shah R, Sawhney R, Mahata D (2018) Detecting offensive tweets in Hindi-English code-switched language. In: Proceedings of the sixth international workshop on natural language processing for social media, pp 18\u201326. https:\/\/doi.org\/10.18653\/v1\/W18-3504.","DOI":"10.18653\/v1\/W18-3504"},{"key":"951_CR69","unstructured":"Mikolov T, Le QV, Sutskever I (2013) Exploiting similarities among languages for machine translation. arXiv:1309.4168v1 [cs.CL]."},{"issue":"1","key":"951_CR70","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1609\/icwsm.v9i1.14625","volume":"9","author":"T Mitra","year":"2015","unstructured":"Mitra T, Gilbert E (2015) Credbank: A largescale social media corpus with associated credibility annotations. Proc Int AAAI Conf Web Social Media 9(1):258\u2013267","journal-title":"Proc Int AAAI Conf Web Social Media"},{"key":"951_CR71","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113725","author":"S Modha","year":"2020","unstructured":"Modha S, Majumder P, Mandl T, Mandalia C (2020) Detecting and visualizing hate speech in social media: A cyber Watchdog for surveillance. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2020.113725","journal-title":"Expert Syst Appl"},{"key":"951_CR72","doi-asserted-by":"crossref","unstructured":"Mollas I, Chrysopoulou Z, Karlos S, Tsoumakas G (2021). ETHOS: an online hate speech detection dataset. arXiv:2006.08328v2 [cs.CL].","DOI":"10.1007\/s40747-021-00608-2"},{"key":"951_CR73","doi-asserted-by":"crossref","unstructured":"Mutanga RT, Naicker N, Olugbara OO (2020). Hate speech detection in twitter using transformer methods, pp 614\u2013620. (IJACSA) Int J Adv Comput Sci Appl, 11(9)","DOI":"10.14569\/IJACSA.2020.0110972"},{"key":"951_CR74","doi-asserted-by":"publisher","unstructured":"Naeem SB, Bhatti R, and Khan A (2021). An exploration of how fake news is taking over social media and putting public health at risk. Health Info Libr J 38(2):143\u2013149. https:\/\/doi.org\/10.1111\/hir.12320. Epub 2020 Jul 12. PMID: 32657000; PMCID: PMC7404621.","DOI":"10.1111\/hir.12320"},{"key":"951_CR75","unstructured":"Nascimento et al (2022) An overview of systematic reviews of the current state of the art of infodemics and health misinformation and its repercussions in public health: recommendations, challenges, and available research opportunities. Bulletin of the World Health Organization. May 2022."},{"issue":"4","key":"951_CR76","first-page":"69","volume":"15","author":"U Naseem","year":"2019","unstructured":"Naseem U, Razzak I, Hameed IA (2019) Deep context-aware embedding for abusive and hate speech detection on twitter. Australian J Intell Inf Process Syst 15(4):69\u201376","journal-title":"Australian J Intell Inf Process Syst"},{"issue":"1","key":"951_CR77","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jjimei.2020.100007","volume":"1","author":"JA Nasir","year":"2021","unstructured":"Nasir JA, Khan OS, Varlamis I (2021) Fake news detection: A hybrid CNN-RNN based deep learning approach. Int J Inf Manag Data Insights 1(1):1\u201313. https:\/\/doi.org\/10.1016\/j.jjimei.2020.100007","journal-title":"Int J Inf Manag Data Insights"},{"issue":"1","key":"951_CR78","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ijinfomgt.2014.09.004","volume":"35","author":"EWT Ngai","year":"2015","unstructured":"Ngai EWT, Tao SSC, Moon KKL (2015) Social media research: Theories, constructs, and conceptual frameworks. Int J Inf Manage 35(1):33\u201344. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2014.09.004","journal-title":"Int J Inf Manage"},{"key":"951_CR79","doi-asserted-by":"crossref","unstructured":"Nguyen VH, Sugiyama K, Nakov P, Kan MY(2020) FANG: leveraging social context for fake news detection using graph representation. arXiv:2008.07939v2 [cs.SI].","DOI":"10.1145\/3340531.3412046"},{"key":"951_CR80","doi-asserted-by":"publisher","unstructured":"Nobata C, Tetreault JR, Thomas A, Mehdad Y, Chang Y (2016) Abusive language detection in online user content. In: Proceedings of the 25th international conference on World Wide Web, pp 145\u2013153. https:\/\/doi.org\/10.1145\/2872427.2883062 .","DOI":"10.1145\/2872427.2883062"},{"key":"951_CR81","unstructured":"P\u00b4erez-Rosas V, Kleinberg B, Lefevre A, Mihalcea R (2017) Automatic detection of fake news. arXiv: 1708.07104."},{"key":"951_CR82","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107393","author":"WS Paka","year":"2020","unstructured":"Paka WS, Bansal R, Kaushik A, Sengupta S, Chakraborty T (2020) Cross-SEAN: A cross-stitch semi-supervised neural attention model for COVID-19 fake news detection. Appl Soft Comput. https:\/\/doi.org\/10.1016\/j.asoc.2021.107393","journal-title":"Appl Soft Comput"},{"issue":"10","key":"951_CR83","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan SJ, Yang Q (2010) A survey on transfer learning. IEEE Trans Knowl Data Eng 22(10):1345\u20131359. https:\/\/doi.org\/10.1109\/TKDE.2009.191","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"951_CR84","doi-asserted-by":"publisher","DOI":"10.37016\/mr-2020-034","author":"O Papakyriakopoulos","year":"2020","unstructured":"Papakyriakopoulos O, Medina Serrano JC, Hegelich S (2020) The spread of COVID-19 conspiracy theories on social media and the effect of content moderation. The Harvard Kennedy School (HKS) Misinform Rev. https:\/\/doi.org\/10.37016\/mr-2020-034","journal-title":"The Harvard Kennedy School (HKS) Misinform Rev"},{"key":"951_CR85","doi-asserted-by":"publisher","unstructured":"Park JH, Fung P (2017) One-step and two-step classification for abusive language detection on twitter. ALW@ACL: 41\u201345. https:\/\/doi.org\/10.18653\/v1\/w17-3006.","DOI":"10.18653\/v1\/w17-3006"},{"key":"951_CR86","doi-asserted-by":"publisher","unstructured":"Patwa P et al. (2021). Fighting an infodemic: COVID-19 fake news dataset. combating online hostile posts in regional languages during emergency situation.In: CONSTRAINT 2021. Communications in Computer and Information Science, vol 1402. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-73696-5_3.","DOI":"10.1007\/978-3-030-73696-5_3"},{"key":"951_CR87","doi-asserted-by":"publisher","unstructured":"Pennington G, Socher R, Manning CD (2014) Glove: Global vectors for word representation. In: Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP), pp 1532\u20131543. doi:https:\/\/doi.org\/10.3115\/v1\/D14-1162.","DOI":"10.3115\/v1\/D14-1162"},{"key":"951_CR88","doi-asserted-by":"publisher","unstructured":"Peters M, Neumann M, Iyyer M, Gardner M, Clark C, Lee K, Zettlemoyer L (2018) Deep contextualized word representations. In Proceedings of the 2018 conference of the north american chapter of the association for computational linguistics: human language technologies, vol 1, pp 2227\u20132237. https:\/\/doi.org\/10.18653\/v1\/N18-1202.","DOI":"10.18653\/v1\/N18-1202"},{"issue":"12","key":"951_CR89","doi-asserted-by":"publisher","first-page":"4730","DOI":"10.1007\/s10489-018-1242-y","volume":"48","author":"GK Pitsilis","year":"2018","unstructured":"Pitsilis GK, Ramampiaro H, Langseth H (2018) Effective hate-speech detection in Twitter data using recurrent neural networks. Appl Intell 48(12):4730\u20134742. https:\/\/doi.org\/10.1007\/s10489-018-1242-y","journal-title":"Appl Intell"},{"key":"951_CR90","doi-asserted-by":"publisher","unstructured":"Qi P, Cao J, Yang T, Guo J, Li J (2019) Exploiting multi-domain visual information for fake news detection. In: 2019 IEEE international conference on data mining (ICDM), pp 517\u2013527. https:\/\/doi.org\/10.1109\/ICDM.2019.00062.","DOI":"10.1109\/ICDM.2019.00062"},{"key":"951_CR91","doi-asserted-by":"publisher","unstructured":"Qian F, Gong C, Sharma K, Liu Y (2018) Neural user response generator: fake news detection with collective user intelligence. In: Proceedings of the twenty-seventh international joint conference on artificial intelligence (IJCAI-18), pp 3834\u20133840. https:\/\/doi.org\/10.24963\/ijcai.2018\/533.","DOI":"10.24963\/ijcai.2018\/533"},{"key":"951_CR92","unstructured":"Ofcom Report (2019) Use of AI in online content moderation."},{"key":"951_CR93","unstructured":"Roberts ST (2016) Commercial content moderation: digital laborers' dirty work. In: Media Studies Publications. 12. https:\/\/ir.lib.uwo.ca\/commpub\/12"},{"key":"951_CR94","doi-asserted-by":"crossref","unstructured":"Roberts ST (2017a) Content moderation. UCLA Previously Published Works, pp 1\u20136","DOI":"10.1007\/978-3-319-32001-4_44-1"},{"key":"951_CR95","unstructured":"Roberts ST (2017b) Social media\u2019s silent filter. https:\/\/www.theatlantic.com\/technology\/archive\/2017b\/03\/commercial-content-moderation\/518796\/ Accessed 17 October 2021."},{"key":"951_CR96","doi-asserted-by":"publisher","unstructured":"Robinson D, Zhang Z, Tepper J (2018) Hate speech detection on Twitter: feature engineering v.s. feature selection. In: Proceedings of the 15th extended semantic web conference, pp 46\u201349, 2018. doi: https:\/\/doi.org\/10.1007\/978-3-319-98192-5_9.","DOI":"10.1007\/978-3-319-98192-5_9"},{"key":"951_CR97","doi-asserted-by":"publisher","unstructured":"Ross B, Rist M, Carbonell G, Cabrera B, Kurowsky N, Wojatzki M(2016) Measuring the reliability of hate speech annotations: the case of the European Refugee Crisis. In: Proceedings of NLP4CMCIII:3rd workshop on natural language processing for computer-mediated communication (Bochum), vol. 17, pp 6\u20139. https:\/\/doi.org\/10.17185\/duepublico\/ 42132.","DOI":"10.17185\/duepublico"},{"key":"951_CR98","doi-asserted-by":"publisher","first-page":"204951","DOI":"10.1109\/ACCESS.2020.3037073","volume":"8","author":"PK Roy","year":"2020","unstructured":"Roy PK, Tripathy AK, Das TK, Gao XZ (2020) A framework for hate speech detection using deep convolutional neural network. IEEE Access 8:204951\u2013204962. https:\/\/doi.org\/10.1109\/ACCESS.2020.3037073","journal-title":"IEEE Access"},{"key":"951_CR99","doi-asserted-by":"publisher","unstructured":"Rubin VL, Conroy N, Chen Y, Cornwell S (2016) Fake news or truth? Using satirical cues to detect potentially misleading news. In: Proceedings of the second workshop on computational approaches to deception detection, pp 7\u201317. https:\/\/doi.org\/10.18653\/v1\/W16-0802.","DOI":"10.18653\/v1\/W16-0802"},{"key":"951_CR100","doi-asserted-by":"publisher","unstructured":"Ruchansky N, Seo S, Liu Y(2017) CSI: a hybrid deep model for fake news detection. In: Proceedings of the 2017 ACM on conference on information and knowledge management, ACM, pp 797\u2013806. https:\/\/doi.org\/10.1145\/3132847.3132877.","DOI":"10.1145\/3132847.3132877"},{"issue":"6","key":"951_CR101","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1177\/1461444819875990","volume":"22","author":"M Ruckenstein","year":"2020","unstructured":"Ruckenstein M, Turunen LL (2020) Re-humanizing the platform: content moderators and the logic of care. New Media Soc 22(6):1026\u20131042","journal-title":"New Media Soc"},{"key":"951_CR102","unstructured":"Sahu G, Cohen R, Vechtomova O (2021) Towards a multi-agent system for online hate speech detection. arXiv:2105.01129v1 [cs.AI]."},{"key":"951_CR103","unstructured":"Sanh V, Debut L, Chaumond J, and Wolf T (2020). DistilBERT, a distilled version of BERT: smaller, faster, cheaper and lighter. arXiv:1910.01108v4 [cs.CL]"},{"key":"951_CR104","doi-asserted-by":"publisher","unstructured":"Schmidt A, Wiegand M (2017) A survey on hate speech detection using natural language processing. In: Proceedings of the fifth international workshop on natural language processing for social media, pp 1\u201310. https:\/\/doi.org\/10.18653\/v1\/W17-1101.","DOI":"10.18653\/v1\/W17-1101"},{"key":"951_CR105","unstructured":"Sharma S, Agrawal S, Shrivastava M (2018) Degree based classification of harmful speech using twitter data. arXiv:1806.04197."},{"issue":"1","key":"951_CR106","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/3137597.3137600","volume":"19","author":"K Shu","year":"2017","unstructured":"Shu K, Sliva A, Wang S, Tang J, Liu H (2017) Fake news detection on social media: a data mining perspective. ACM SIGKDD Explorations Newsl 19(1):22\u201336. https:\/\/doi.org\/10.1145\/3137597.3137600","journal-title":"ACM SIGKDD Explorations Newsl"},{"key":"951_CR107","unstructured":"Shu K, Mahudeswaran D, Wang S, Lee D, Liu H (2018) Fakenewsnet: A data repository with news content, social context and dynamic information for studying fake news on social media. arXiv:1809.01286v3 [cs.SI]."},{"key":"951_CR108","doi-asserted-by":"publisher","unstructured":"Shu K, Cui L, Wang S, Lee D, Liu H (2019) DEFEND: explainable fake news detection. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery data mining, pp 395\u2013405. https:\/\/doi.org\/10.1145\/3292500.3330935.","DOI":"10.1145\/3292500.3330935"},{"key":"951_CR109","unstructured":"Singh S (2019) Everything in Moderation. https:\/\/ newamerica.org\/oti\/reports\/everything-moderation-analysis-how-internet-platforms-are-using-artificialintelligence-moderate-user-generated-content."},{"key":"951_CR110","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-020-10040-5","author":"JP Singh","year":"2020","unstructured":"Singh JP, Kumar A, Rana N, Dwivedi Y (2020) Attention-based LSTM network for rumor veracity estimation of tweets. Inf Syst Front. https:\/\/doi.org\/10.1007\/s10796-020-10040-5","journal-title":"Inf Syst Front"},{"key":"951_CR111","doi-asserted-by":"publisher","unstructured":"Singhal S, Shah RR, Chakraborty T, Kumaraguru P, Satoh S (2019) SpotFake: a multi-modal framework for fake news detection. IEEE fifth international conference on multimedia big data (BigMM), pp 39\u201347. https:\/\/doi.org\/10.1109\/BigMM.2019.00-44.","DOI":"10.1109\/BigMM.2019.00-44"},{"key":"951_CR112","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-70096-0_59","volume":"10635","author":"S Singhania","year":"2017","unstructured":"Singhania S, Fernandez N, Rao S (2017) 3HAN: a deep neural network for fake news detection. ICONIP 2017. Part II, LNCS 10635:1\u201310. https:\/\/doi.org\/10.1007\/978-3-319-70096-0_59","journal-title":"Part II, LNCS"},{"key":"951_CR113","first-page":"5998","volume":"30","author":"A Vaswani","year":"2017","unstructured":"Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser L, Polosukhin I (2017) Attention is all you need. Adv Neural Inf Process Syst 30:5998\u20136008","journal-title":"Adv Neural Inf Process Syst"},{"key":"951_CR114","unstructured":"Verma G, Srinivasan BV (2019) A lexical, syntactic, and semantic perspective for understanding style in text. arXiv:1909.08349v1 [cs.CL]."},{"key":"951_CR115","unstructured":"Vigna FD, Cimino A, Dell'Orletta F, Petrocchi M, Tesconi M (2017). Hate me, hate me not: hate speech detection on facebook. In: Proceedings of the first Italian conference on cybersecurity (ITASEC17), 86\u201395."},{"issue":"1","key":"951_CR116","first-page":"7","volume":"5","author":"S Vijayarani","year":"2015","unstructured":"Vijayarani S, Ilamathi J, Nithya S (2015) Preprocessing techniques for text mining - an overview. Int J Comput Sci Commun Netw 5(1):7\u201316","journal-title":"Int J Comput Sci Commun Netw"},{"key":"951_CR117","doi-asserted-by":"crossref","unstructured":"Wang WY (2017) Liar, liar pants on fire: a new benchmark dataset for fake news detection. arXiv:1705.00648v1 [cs.CL] .","DOI":"10.18653\/v1\/P17-2067"},{"key":"951_CR118","doi-asserted-by":"crossref","unstructured":"Wang B, Ding H (2019). YNU NLP at SemEval-2019 task 5: attention and capsule ensemble for identifying hate speech. In: Proceedings of the 13th international workshop on semantic evaluation (SemEval-2019), pp 529\u2013534","DOI":"10.18653\/v1\/S19-2095"},{"key":"951_CR119","doi-asserted-by":"publisher","unstructured":"Wang Y, Ma F, Jin Z, Yuan Y, Xun G, Jha K, Su L, Gao J (2018) EANN: event adversarial neural networks for multi-modal fake news detection. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, pp 849\u2013857. https:\/\/doi.org\/10.1145\/3219819.3219903.","DOI":"10.1145\/3219819.3219903"},{"key":"951_CR120","doi-asserted-by":"publisher","unstructured":"Waseem Z (2016) Are you a racist or am I seeing things? Annotator influence on hate speech detection on Twitter. In: Proceedings of the first workshop on NLP and computational social science, pp 138\u2013142. https:\/\/doi.org\/10.18653\/v1\/W16-5618.","DOI":"10.18653\/v1\/W16-5618"},{"key":"951_CR121","doi-asserted-by":"crossref","unstructured":"Waseem Z, Hovy D (2016) Hateful symbols or hateful people? Predictive features for hate speech detection on twitter, In: Proceedings of NAACL-HLT, pp 88\u201393.","DOI":"10.18653\/v1\/N16-2013"},{"key":"951_CR122","doi-asserted-by":"publisher","first-page":"13825","DOI":"10.1109\/ACCESS.2018.2806394","volume":"6","author":"H Watanabe","year":"2018","unstructured":"Watanabe H, Bouazizi M, Ohtsuki T (2018) Hate speech on twitter a pragmatic approach to collect hateful and offensive expressions and perform hate speech detection. IEEE Access 6:13825\u201313835. https:\/\/doi.org\/10.1109\/ACCESS.2018.2806394","journal-title":"IEEE Access"},{"key":"951_CR123","unstructured":"Wendling M (2018) The (almost) complete history of 'fake news'. https:\/\/www.bbc.com\/news\/blogs-trending-42724320. Accessed 12 October 2021."},{"key":"951_CR124","doi-asserted-by":"publisher","unstructured":"Wyrwoll C (2014) User-generated content. In: Social media, pp 11\u201345. https:\/\/doi.org\/10.1007\/978-3-658-06984-1_2.","DOI":"10.1007\/978-3-658-06984-1_2"},{"key":"951_CR125","doi-asserted-by":"publisher","unstructured":"Yang Z, Wang C, Zhang F, Zhang Y, Zhang H (2015) Emerging rumor identification for social media with hot topic detection. In: 12th web information system and application conference (WISA), pp 53\u201358. https:\/\/doi.org\/10.1109\/WISA.2015.19.","DOI":"10.1109\/WISA.2015.19"},{"key":"951_CR126","unstructured":"Yang Z et al (2020). XLNet: generalized autoregressive pretraining for language understanding. arXiv:1906.08237v2 [cs.CL]"},{"key":"951_CR127","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.03.004","author":"X Zhang","year":"2020","unstructured":"Zhang X, Ghorbani AA (2020) An overview of online fake news: characterization, detection, and discussion. Inf Process Manag. https:\/\/doi.org\/10.1016\/j.ipm.2019.03.004","journal-title":"Inf Process Manag"},{"key":"951_CR128","doi-asserted-by":"publisher","first-page":"925","DOI":"10.3233\/SW-180338","volume":"1","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Luo L (2019) Hate speech detection: a solved problem? The challenging case of long tail on twitter. Semantic Web 1:925\u2013945","journal-title":"Semantic Web"},{"key":"951_CR129","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1007\/978-3-319-93417-4_48","volume":"10843","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Robinson D, Tepper J (2018) Detecting hate speech on twitter using a convolution-GRU based deep neural network. ESWC 2018 LNCS 10843:745\u2013760. https:\/\/doi.org\/10.1007\/978-3-319-93417-4_48","journal-title":"ESWC 2018 LNCS"},{"key":"951_CR130","doi-asserted-by":"publisher","unstructured":"Zhang Q, Zhang S, Dong J, Xiong J, Cheng X (2015) Automatic detection of rumor on social network. LNAI 9362, NLPCC, pp 113\u2013122. https:\/\/doi.org\/10.1007\/978-3-319-25207-0_10.","DOI":"10.1007\/978-3-319-25207-0_10"},{"key":"951_CR131","doi-asserted-by":"crossref","unstructured":"Zhang J, Dong B, Yu PS (2019) FAKEDETECTOR: effective fake news detection with deep diffusive neural network. arXiv:1805.08751v2 [cs.SI].","DOI":"10.1109\/ICDE48307.2020.00180"},{"key":"951_CR132","doi-asserted-by":"crossref","unstructured":"Zhong H, Li H, Squicciarini AC, Rajtmajer SM, Griffin C, Miller DJ Caragea C (2016) Content-driven detection of cyberbullying on the instagram social network. In: IJCAI, proceedings of the twenty-fifth international joint conference on artificial intelligence, pp 3952\u2013 3958","DOI":"10.24963\/ijcai.2017\/552"},{"key":"951_CR133","doi-asserted-by":"publisher","unstructured":"Zhou Y, Yang Y, Liu H, Liu X, and Savage N (2020) Deep learning based fusion approach for hate speech detection, pp 128923\u2013128929.IEEE Access, vol. 8, https:\/\/doi.org\/10.1109\/ACCESS.2020.3009244.","DOI":"10.1109\/ACCESS.2020.3009244"},{"key":"951_CR134","doi-asserted-by":"publisher","unstructured":"Zhou X, Wu J, Zafarani R (2020b) SAFE: similarity-aware multi-modal fake news detection. In: The 24th pacific-asia conference on knowledge discovery and data mining, LNAI 12085: 354\u2013367, 2020b. https:\/\/doi.org\/10.1007\/978-3-030-47436-2_27.","DOI":"10.1007\/978-3-030-47436-2_27"},{"issue":"5","key":"951_CR135","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3395046","volume":"53","author":"X Zhou","year":"2020","unstructured":"Zhou X, Zafarani R (2020) A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput Surv 53(5):1\u201330. https:\/\/doi.org\/10.1145\/3395046","journal-title":"ACM Comput Surv"}],"updated-by":[{"DOI":"10.1007\/s13278-022-00991-9","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000}}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-022-00951-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-022-00951-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-022-00951-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:36:03Z","timestamp":1744205763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-022-00951-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":135,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["951"],"URL":"https:\/\/doi.org\/10.1007\/s13278-022-00951-3","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s13278-022-00991-9","asserted-by":"object"}]},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,5]]},"assertion":[{"value":"25 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2022","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s13278-022-00991-9","URL":"https:\/\/doi.org\/10.1007\/s13278-022-00991-9","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"129"}}