{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T21:44:23Z","timestamp":1771537463446,"version":"3.50.1"},"reference-count":132,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T00:00:00Z","timestamp":1738713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Data Sci Anal"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s41060-025-00727-w","type":"journal-article","created":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T15:29:56Z","timestamp":1738769396000},"page":"4149-4176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A review of web infodemic analysis and detection trends across multi-modalities using deep neural network"],"prefix":"10.1007","volume":"20","author":[{"given":"Priyanka","family":"Meel","sequence":"first","affiliation":[]},{"given":"Chahat","family":"Raj","sequence":"additional","affiliation":[]},{"family":"Bhawna","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,5]]},"reference":[{"key":"727_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.patrec.2023.02.026","volume":"168","author":"Q Zhang","year":"2023","unstructured":"Zhang, Q., Guo, Z., Zhu, Y., Vijayakumar, P., Castiglione, A., Gupta, B.B.: A Deep Learning-based Fast Fake News Detection Model for Cyber-Physical Social Services. Pattern Recogn. Lett. 168, 31\u201338 (2023). https:\/\/doi.org\/10.1016\/j.patrec.2023.02.026","journal-title":"Pattern Recogn. Lett."},{"key":"727_CR2","doi-asserted-by":"publisher","unstructured":"Zhang, J., Tohidypour, H., Wang, Y., Nasiopoulos, P.: \u201cShallow- and Deep- fake Image Manipulation Localization Using Deep Learning,\u201d In: 2023 International Conference On Computing, Networking and Communications (Icnc), Honolulu, HI, USA: IEEE, (2023) https:\/\/doi.org\/10.1109\/ICNC57223.2023.10074246","DOI":"10.1109\/ICNC57223.2023.10074246"},{"issue":"8","key":"727_CR3","doi-asserted-by":"publisher","first-page":"9727","DOI":"10.1007\/s13369-022-07321-3","volume":"48","author":"S Suratkar","year":"2023","unstructured":"Suratkar, S., Kazi, F.: Deep Fake Video Detection Using Transfer Learning Approach. Arab. J. Sci. Eng. 48(8), 9727\u20139737 (2023). https:\/\/doi.org\/10.1007\/s13369-022-07321-3","journal-title":"Arab. J. Sci. Eng."},{"issue":"3","key":"727_CR4","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11196-023-10079-y","volume":"37","author":"R Gramigna","year":"2024","unstructured":"Gramigna, R.: Preserving Anonymity: Deep-Fake as an Identity-Protection Device and as a Digital Camouflage. Int. J. Semiot. Law 37(3), 729\u2013751 (2024). https:\/\/doi.org\/10.1007\/s11196-023-10079-y","journal-title":"Int. J. Semiot. Law"},{"key":"727_CR5","unstructured":"D. D\u2019Cruze, \u201cNo! The government is doing no such thing\u2019: PIB team busts myth about govt reading WhatsApp messages,\u201d BT Business Today, 2023. [Online]. Available: https:\/\/www.businesstoday.in\/technology\/news\/story\/no-the-government-is-ng-no-such-thing-pib-team-busts-myth-about-govt-reading-whatsapp-messages-392317-2023-08-01"},{"key":"727_CR6","unstructured":"Archit and S. Satani, \u201cEdited video of \u2018three-eyed\u2019 baby believed to be true on social media,\u201d alt News, 2020. [Online]. Available: https:\/\/www.altnews.in\/edited-video-of-three-eyed-baby-believed-to-be-true-on-social-media\/"},{"key":"727_CR7","unstructured":"\u201c\u2018Fact check: Viral picture of Facebook CEO Mark Zuckerberg, PM Narendra Modi is morphed.,\u2019\u201d Newsmeter Network, 2020. [Online]. Available: https:\/\/newsmeter.in\/fact-check\/fact-check-viral-picture-of-facebook-ceo-mark-zuckerberg-pm-narendra-modi-is-morphed-671882"},{"key":"727_CR8","unstructured":"\u201cKashmir fake photo: Fallout from the UN speech by Pakistan\u2019s Maleeha Lodhi,\u201d BBC News, 2017. [Online]. Available: https:\/\/www.bbc.com\/news\/world-asia-41427929"},{"key":"727_CR9","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1109\/TIFS.2023.3249566","volume":"18","author":"Z Yang","year":"2023","unstructured":"Yang, Z., Liang, J., Xu, Y., Zhang, X.-Y., He, R.: Masked Relation Learning for DeepFake Detection. IEEE Trans. Inform. Forensic Secur. 18, 1696\u20131708 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3249566","journal-title":"IEEE Trans. Inform. Forensic Secur."},{"key":"727_CR10","unstructured":"S. Sharma, \u201cJoint multimodal sentiment analysis based on information relevance.\u201d Accessed: Dec. 12, 2023. [Online]. Available: https:\/\/ojs.aaai.org\/index.php\/ICWSM\/article\/view\/7356\/7210"},{"key":"727_CR11","unstructured":"Y. Ju, S. Hu, S. Jia, G. H. Chen, and S. Lyu, \u201cImproving Fairness in Deepfake Detection\u201d."},{"key":"727_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2016.75","volume-title":"\u201cWhat You See is What You Get? Automatic Image Verification for Online News Content\u201d, in 2016 12th IAPR Workshop on Document Analysis Systems (DAS)","author":"S Elkasrawi","year":"2016","unstructured":"Elkasrawi, S., Dengel, A., Abdelsamad, A., Bukhari, S.S.: \u201cWhat You See is What You Get? Automatic Image Verification for Online News Content\u201d, in 2016 12th IAPR Workshop on Document Analysis Systems (DAS). IEEE, Santorini, Greece (2016). https:\/\/doi.org\/10.1109\/DAS.2016.75"},{"key":"727_CR13","doi-asserted-by":"publisher","unstructured":"Y. Wang et al., \u201cEANN: Event Adversarial Neural Networks for Multi-Modal Fake News Detection,\u201d in Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, London United Kingdom: ACM, Jul. 2018, pp. 849\u2013857. https:\/\/doi.org\/10.1145\/3219819.3219903.","DOI":"10.1145\/3219819.3219903"},{"key":"727_CR14","unstructured":"S. Suryavardan et al., \u201cFactify 2: A Multimodal Fake News and Satire News Dataset\u201d."},{"key":"727_CR15","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/B978-0-443-19413-9.00014-X","volume-title":"Deep Learning in Personalized Healthcare and Decision Support","author":"SA Ramin Safa","year":"2023","unstructured":"Ramin Safa, S.A., Edalatpanah, A.S.: Predicting mental health using social media: A roadmap for future development. In: Deep Learning in Personalized Healthcare and Decision Support, pp. 285\u2013303. Elsevier (2023). https:\/\/doi.org\/10.1016\/B978-0-443-19413-9.00014-X"},{"key":"727_CR16","doi-asserted-by":"publisher","DOI":"10.1145\/3610288","author":"Lu Junxia Ma","year":"2023","unstructured":"Junxia Ma, Lu., Rong, Y.Z., Tiwari, P.: Moving From Narrative to Interactive Multi-Modal Sentiment Analysis: A Survey. ACM Transactions on Asian and Low-Resource Language Information Processing (2023). https:\/\/doi.org\/10.1145\/3610288","journal-title":"ACM Transactions on Asian and Low-Resource Language Information Processing"},{"key":"727_CR17","doi-asserted-by":"publisher","unstructured":"\u201cFakedBits- Detecting Fake Information on Social Platforms using Multi-Modal Features,\u201d KSII TIIS, vol. 17, no. 1, Jan. 2023, https:\/\/doi.org\/10.3837\/tiis.2023.01.004.","DOI":"10.3837\/tiis.2023.01.004"},{"key":"727_CR18","doi-asserted-by":"publisher","unstructured":"Z. Jin, J. Cao, J. Luo, and Y. Zhang, \u201cImage Credibility Analysis with Effective Domain Transferred Deep Networks,\u201d Nov. 16, 2016, arXiv: arXiv:1611.05328. https:\/\/doi.org\/10.48550\/arXiv.1611.05328.","DOI":"10.48550\/arXiv.1611.05328"},{"key":"727_CR19","doi-asserted-by":"publisher","unstructured":"P. Qi, J. Cao, T. Yang, J. Guo, and J. Li, \u201cExploiting Multi-domain Visual Information for Fake News Detection,\u201d in 2019 IEEE International Conference on Data Mining (ICDM), Beijing, China: IEEE, Nov. 2019, pp. 518\u2013527. https:\/\/doi.org\/10.1109\/ICDM.2019.00062.","DOI":"10.1109\/ICDM.2019.00062"},{"key":"727_CR20","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.cogsys.2019.07.004","volume":"58","author":"DK Vishwakarma","year":"2019","unstructured":"Vishwakarma, D.K., Varshney, D., Yadav, A.: Detection and veracity analysis of fake news via scrapping and authenticating the web search. Cogn. Syst. Res. 58, 217\u2013229 (2019). https:\/\/doi.org\/10.1016\/j.cogsys.2019.07.004","journal-title":"Cogn. Syst. Res."},{"key":"727_CR21","doi-asserted-by":"publisher","unstructured":"C. Pasquini, C. Brunetta, A. F. Vinci, V. Conotter, and G. Boato, \u201cTowards the verification of image integrity in online news,\u201d in 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Turin, Italy: IEEE, Jun. 2015, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICMEW.2015.7169801.","DOI":"10.1109\/ICMEW.2015.7169801"},{"key":"727_CR22","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-030-01252-6_7","volume-title":"Computer Vision \u2013 ECCV 2018: 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part XI","author":"M Huh","year":"2018","unstructured":"Huh, M., Liu, A., Owens, A., Efros, A.A.: Fighting Fake News: Image Splice Detection via Learned Self-Consistency. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) Computer Vision \u2013 ECCV 2018: 15th European Conference, Munich, Germany, September 8-14, 2018, Proceedings, Part XI, pp. 106\u2013124. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01252-6_7"},{"key":"727_CR23","doi-asserted-by":"publisher","unstructured":"L. Cui, S. Wang, and D. Lee, \u201cSAME: sentiment-aware multi-modal embedding for detecting fake news,\u201d in Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, Vancouver British Columbia Canada: ACM, Aug. 2019, pp. 41\u201348. https:\/\/doi.org\/10.1145\/3341161.3342894.","DOI":"10.1145\/3341161.3342894"},{"key":"727_CR24","unstructured":"Z. Jin, J. Cao, Y. Zhang, and Y. Zhang, \u201cMCG-ICT at MediaEval 2015: Verifying Multimedia Use with a Two-Level Classification Model\u201d."},{"key":"727_CR25","doi-asserted-by":"publisher","unstructured":"A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi, \u201cFaking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy,\u201d in Proceedings of the 22nd International Conference on World Wide Web, Rio de Janeiro Brazil: ACM, May 2013, pp. 729\u2013736. https:\/\/doi.org\/10.1145\/2487788.2488033.","DOI":"10.1145\/2487788.2488033"},{"key":"727_CR26","unstructured":"C. Maigrot, V. Claveau, E. Kijak, and R. Sicre, \u201cMediaEval 2016: A multimodal system for the Verifying Multimedia Use task\u201d."},{"key":"727_CR27","doi-asserted-by":"publisher","unstructured":"Y. Zhang, L. Zheng, and V. L. L. Thing, \u201cAutomated face swapping and its detection,\u201d in 2017 IEEE 2nd International Conference on Signal and Image Processing (ICSIP), Singapore: IEEE, Aug. 2017, pp. 15\u201319. https:\/\/doi.org\/10.1109\/SIPROCESS.2017.8124497.","DOI":"10.1109\/SIPROCESS.2017.8124497"},{"issue":"3","key":"727_CR28","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1109\/TMM.2016.2617078","volume":"19","author":"Z Jin","year":"2017","unstructured":"Jin, Z., Cao, J., Zhang, Y., Zhou, J., Tian, Q.: Novel Visual and Statistical Image Features for Microblogs News Verification. IEEE Trans. Multimedia 19(3), 598\u2013608 (2017). https:\/\/doi.org\/10.1109\/TMM.2016.2617078","journal-title":"IEEE Trans. Multimedia"},{"key":"727_CR29","doi-asserted-by":"publisher","unstructured":"P. Zhou, X. Han, V. I. Morariu, and L. S. Davis, \u201cTwo-Stream Neural Networks for Tampered Face Detection,\u201d in 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), Honolulu, HI, USA: IEEE, Jul. 2017, pp. 1831\u20131839. https:\/\/doi.org\/10.1109\/CVPRW.2017.229.","DOI":"10.1109\/CVPRW.2017.229"},{"key":"727_CR30","doi-asserted-by":"publisher","unstructured":"O. Papadopoulou, M. Zampoglou, S. Papadopoulos, and Y. Kompatsiaris, \u201cWeb Video Verification using Contextual Cues,\u201d in Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, Bucharest Romania: ACM, Jun. 2017, pp. 6\u201310. https:\/\/doi.org\/10.1145\/3078897.3080535.","DOI":"10.1145\/3078897.3080535"},{"key":"727_CR31","doi-asserted-by":"publisher","unstructured":"Z. Jin, J. Cao, H. Guo, Y. Zhang, and J. Luo, \u201cMultimodal Fusion with Recurrent Neural Networks for Rumor Detection on Microblogs,\u201d in Proceedings of the 25th ACM international conference on Multimedia, Mountain View California USA: ACM, Oct. 2017, pp. 795\u2013816. https:\/\/doi.org\/10.1145\/3123266.3123454.","DOI":"10.1145\/3123266.3123454"},{"issue":"4","key":"727_CR32","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1089\/big.2017.0071","volume":"5","author":"S Huckle","year":"2017","unstructured":"Huckle, S., White, M.: Fake News: A Technological Approach to Proving the Origins of Content, Using Blockchains. Big Data 5(4), 356\u2013371 (2017). https:\/\/doi.org\/10.1089\/big.2017.0071","journal-title":"Big Data"},{"key":"727_CR33","doi-asserted-by":"publisher","unstructured":"A. Jaiswal, E. Sabir, W. AbdAlmageed, and P. Natarajan, 2017 \u201cMultimedia Semantic Integrity Assessment Using Joint Embedding Of Images And Text,\u201d in Proceedings of the 25th ACM international conference on Multimedia, Mountain View California USA: ACM, https:\/\/doi.org\/10.1145\/3123266.3123385.","DOI":"10.1145\/3123266.3123385"},{"key":"727_CR34","doi-asserted-by":"publisher","unstructured":"Y. Yang, L. Zheng, J. Zhang, Q. Cui, Z. Li, and P. S. Yu, \u201cTI-CNN: Convolutional Neural Networks for Fake News Detection,\u201d Jan. 13, 2023, arXiv: arXiv:1806.00749. https:\/\/doi.org\/10.48550\/arXiv.1806.00749.","DOI":"10.48550\/arXiv.1806.00749"},{"key":"727_CR35","doi-asserted-by":"publisher","unstructured":"S. Krishnan and M. Chen, \u201cIdentifying Tweets with Fake News,\u201d in 2018 IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, UT: IEEE, Jul. 2018, pp. 460\u2013464. https:\/\/doi.org\/10.1109\/IRI.2018.00073.","DOI":"10.1109\/IRI.2018.00073"},{"key":"727_CR36","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-01231-1_11","volume-title":"Computer Vision \u2013 ECCV 2018: 15th European Conference, Munich, Germany, September 8\u201314, 2018, Proceedings, Part VI","author":"Wu Yue","year":"2018","unstructured":"Yue, Wu., Abd-Almageed, W., Natarajan, P.: Busternet: Detecting copy-move image forgery with source\/target localization. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) Computer Vision \u2013 ECCV 2018: 15th European Conference, Munich, Germany, September 8\u201314, 2018, Proceedings, Part VI, pp. 170\u2013186. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01231-1_11"},{"key":"727_CR37","doi-asserted-by":"publisher","unstructured":"F. Lago, Q. Tin Phan, and G. Boato, \u201cVisual and textual analysis for image trustworthiness assessment within online news,\u201d Security and Communication Networks, no. 1, p. 9236910, 2019, https:\/\/doi.org\/10.1155\/2019\/9236910.","DOI":"10.1155\/2019\/9236910"},{"key":"727_CR38","doi-asserted-by":"publisher","unstructured":"K. Shu, X. Zhou, S. Wang, R. Zafarani, and H. Liu, \u201cThe role of user profiles for fake news detection,\u201d in Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, Vancouver British Columbia Canada: ACM, Aug. 2019, pp. 436\u2013439. https:\/\/doi.org\/10.1145\/3341161.3342927.","DOI":"10.1145\/3341161.3342927"},{"key":"727_CR39","unstructured":"E. Sabir, J. Cheng, A. Jaiswal, W. AbdAlmageed, I. Masi, and P. Natarajan, \u201cRecurrent Convolutional Strategies for Face Manipulation Detection in Videos,\u201d in Interfaces (GUI), 2019, 2019, pp. 80\u201387. [Online]. Available: chrome-extension:\/\/efaidnbmnnnibpcajpcglclefindmkaj\/https:\/\/openaccess.thecvf.com\/content_CVPRW_2019\/papers\/Media%20Forensics\/Sabir_Recurrent_Convolutional_Strategies_for_Face_Manipulation_Detection_in_Videos_CVPRW_2019_paper.pdf"},{"key":"727_CR40","doi-asserted-by":"publisher","unstructured":"D. Khattar, J. S. Goud, M. Gupta, and V. Varma, \u201cMVAE: Multimodal Variational Autoencoder for Fake News Detection,\u201d in The World Wide Web Conference, San Francisco CA USA: ACM, May 2019, pp. 2915\u20132921. https:\/\/doi.org\/10.1145\/3308558.3313552.","DOI":"10.1145\/3308558.3313552"},{"key":"727_CR41","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-030-47436-2_27","volume-title":"Advances in Knowledge Discovery and Data Mining: 24th Pacific-Asia Conference, PAKDD 2020, Singapore, May 11\u201314, 2020, Proceedings, Part II","author":"X Zhou","year":"2020","unstructured":"Zhou, X., Jindi, Wu., Zafarani, R.: $$\\mathsf {SAFE}$$: Similarity-Aware Multi-modal Fake News Detection. In: Lauw, H.W., Wong, R.-W., Ntoulas, A., Lim, E.-P., Ng, S.-K., Pan, S.J. (eds.) Advances in Knowledge Discovery and Data Mining: 24th Pacific-Asia Conference, PAKDD 2020, Singapore, May 11\u201314, 2020, Proceedings, Part II, pp. 354\u2013367. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-47436-2_27"},{"key":"727_CR42","doi-asserted-by":"publisher","unstructured":"D. Zlatkova, P. Nakov, and I. Koychev, \u201cFact-Checking Meets Fauxtography: Verifying Claims About Images,\u201d Aug. 30, 2019, arXiv: arXiv:1908.11722. https:\/\/doi.org\/10.48550\/arXiv.1908.11722.","DOI":"10.48550\/arXiv.1908.11722"},{"issue":"1","key":"727_CR43","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/asi.24359","volume":"72","author":"VK Singh","year":"2021","unstructured":"Singh, V.K., Ghosh, I., Sonagara, D.: Detecting fake news stories via multimodal analysis. Asso for Info Science & Tech 72(1), 3\u201317 (2021). https:\/\/doi.org\/10.1002\/asi.24359","journal-title":"Asso for Info Science & Tech"},{"key":"727_CR44","doi-asserted-by":"publisher","unstructured":"M. Steinebach, K. Gotkowski, and H. Liu, \u201cFake News Detection by Image Montage Recognition,\u201d in Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury CA United Kingdom: ACM, Aug. 2019, pp. 1\u20139. https:\/\/doi.org\/10.1145\/3339252.3341487.","DOI":"10.1145\/3339252.3341487"},{"issue":"1","key":"727_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103120","volume":"60","author":"J Jing","year":"2023","unstructured":"Jing, J., Wu, H., Sun, J., Fang, X., Zhang, H.: Multimodal fake news detection via progressive fusion networks. Inf. Process. Manage. 60(1), 103120 (2023). https:\/\/doi.org\/10.1016\/j.ipm.2022.103120","journal-title":"Inf. Process. Manage."},{"issue":"1","key":"727_CR46","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1109\/TCSS.2023.3244068","volume":"11","author":"X Zhang","year":"2024","unstructured":"Zhang, X., Dadkhah, S., Weismann, A.G., Kanaani, M.A., Ghorbani, A.A.: Multimodal Fake News Analysis Based on Image-Text Similarity. IEEE Trans. Comput. Soc. Syst. 11(1), 959\u2013972 (2024). https:\/\/doi.org\/10.1109\/TCSS.2023.3244068","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"3","key":"727_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3645094","volume":"18","author":"M Umair","year":"2024","unstructured":"Umair, M., Bouguettaya, A., Lakhdari, A., Ouzzani, M., Liu, Y.: Exif2Vec: A Framework to Ascertain Untrustworthy Crowdsourced Images Using Metadata. ACM Trans. Web 18(3), 1\u201327 (2024). https:\/\/doi.org\/10.1145\/3645094","journal-title":"ACM Trans. Web"},{"key":"727_CR48","doi-asserted-by":"publisher","unstructured":"O. Ajao, D. Bhowmik, and S. Zargari, \u201cFake News Identification on Twitter with Hybrid CNN and RNN Models,\u201d in Proceedings of the 9th International Conference on Social Media and Society, Copenhagen Denmark: ACM, Jul. 2018, pp. 226\u2013230. https:\/\/doi.org\/10.1145\/3217804.3217917.","DOI":"10.1145\/3217804.3217917"},{"key":"727_CR49","doi-asserted-by":"publisher","unstructured":"S. Singhal, R. R. Shah, T. Chakraborty, P. Kumaraguru, and S. Satoh, \u201cSpotFake: A Multi-modal Framework for Fake News Detection,\u201d in 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM), Singapore, Singapore: IEEE, Sep. 2019, pp. 39\u201347. https:\/\/doi.org\/10.1109\/BigMM.2019.00-44.","DOI":"10.1109\/BigMM.2019.00-44"},{"key":"727_CR50","doi-asserted-by":"publisher","unstructured":"D. S\u00e1ez-Trumper, \u201cFake tweet buster: a webtool to identify users promoting fake news on twitter,\u201d in In Proceedings of the 25th ACM conference on Hypertext and social media, Association for Computing Machinery, 2014, pp. 316\u2013317. https:\/\/doi.org\/10.1145\/2631775.2631786.","DOI":"10.1145\/2631775.2631786"},{"key":"727_CR51","unstructured":"G. Armano et al., \u201cNewsVallum: Semantics-Aware Text and Image Processing for Fake News Detection system\u22c6\u201d."},{"issue":"1","key":"727_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/pra2.2015.145052010081","volume":"52","author":"Y Chen","year":"2015","unstructured":"Chen, Y., Conroy, N.K., Rubin, V.L.: News in an online world: The need for an \u2018automatic crap detector.\u2019 Proc. Assoc. Info. Sci. Tech. 52(1), 1\u20134 (2015). https:\/\/doi.org\/10.1002\/pra2.2015.145052010081","journal-title":"Proc. Assoc. Info. Sci. Tech."},{"key":"727_CR53","doi-asserted-by":"publisher","unstructured":"E. M\u00fcller-Budack, J. Theiner, S. Diering, M. Idahl, and R. Ewerth, \u201cMulti-modal analytics for real-world news using measures of cross-modal entity consistency,\u201d in Proceedings of the 2020 international conference on multimedia retrieval, Dublin, Ireland: Association for Computing Machinery, pp. 16\u201325. https:\/\/doi.org\/10.1145\/3372278.3390670.","DOI":"10.1145\/3372278.3390670"},{"key":"727_CR54","doi-asserted-by":"publisher","unstructured":"S. B. Parikh, S. R. Khedia, and P. K. Atrey, \u201cA Framework to Detect Fake Tweet Images on Social Media,\u201d in 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM), Singapore, Singapore: IEEE, Sep. 2019, pp. 104\u2013110. https:\/\/doi.org\/10.1109\/BigMM.2019.00-37.","DOI":"10.1109\/BigMM.2019.00-37"},{"key":"727_CR55","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-030-05710-7_12","volume-title":"MultiMedia Modeling: 25th International Conference, MMM 2019, Thessaloniki, Greece, January 8\u201311, 2019, Proceedings, Part I","author":"L Nixon","year":"2019","unstructured":"Nixon, L., Apostolidis, E., Markatopoulou, F., Patras, I., Mezaris, V.: Multimodal Video Annotation for Retrieval and Discovery of Newsworthy Video in a News Verification Scenario. In: Kompatsiaris, I., Huet, B., Mezaris, V., Gurrin, C., Cheng, W.-H., Vrochidis, S. (eds.) MultiMedia Modeling: 25th International Conference, MMM 2019, Thessaloniki, Greece, January 8\u201311, 2019, Proceedings, Part I, pp. 143\u2013155. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-05710-7_12"},{"key":"727_CR56","doi-asserted-by":"publisher","unstructured":"A. Bagade et al., \u201cThe Kauwa-Kaate Fake News Detection System: Demo,\u201d in Proceedings of the 7th ACM IKDD CoDS and 25th COMAD, Hyderabad India: ACM, Jan. 2020, pp. 302\u2013306. https:\/\/doi.org\/10.1145\/3371158.3371402.","DOI":"10.1145\/3371158.3371402"},{"issue":"1","key":"727_CR57","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s13735-017-0143-x","volume":"7","author":"C Boididou","year":"2018","unstructured":"Boididou, C., Papadopoulos, S., Zampoglou, M., Apostolidis, L., Papadopoulou, O., Kompatsiaris, Y.: Detection and visualization of misleading content on Twitter. Int J Multimed Info Retr 7(1), 71\u201386 (2018). https:\/\/doi.org\/10.1007\/s13735-017-0143-x","journal-title":"Int J Multimed Info Retr"},{"key":"727_CR58","doi-asserted-by":"publisher","unstructured":"S. Sun, H. Liu, J. He, and X. Du, \u201cDetecting Event Rumors on Sina Weibo Automatically,\u201d in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer, pp. 120\u2013131. https:\/\/doi.org\/10.1007\/978-3-642-37401-2_14.","DOI":"10.1007\/978-3-642-37401-2_14"},{"key":"727_CR59","doi-asserted-by":"publisher","unstructured":"B. Bayar and M. C. Stamm, \u201cA Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer,\u201d in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, Vigo Galicia Spain: ACM, Jun. 2016, pp. 5\u201310. https:\/\/doi.org\/10.1145\/2909827.2930786.","DOI":"10.1145\/2909827.2930786"},{"key":"727_CR60","doi-asserted-by":"publisher","unstructured":"E. Sabir, W. AbdAlmageed, Y. Wu, and P. Natarajan, \u201cDeep multi-modal image-repurposing detection,\u201d in MM \u201918: Proceedings of the 26th ACM international conference on Multimedia, Seoul, Republic of Korea: Association for Computing Machinery, 2018, pp. 1337\u20131345. https:\/\/doi.org\/10.1145\/3240508.3240707.","DOI":"10.1145\/3240508.3240707"},{"key":"727_CR61","doi-asserted-by":"crossref","unstructured":"A. Jaiswal, Y. Wu, W. AbdAlmageed, I. Masi, and P. Natarajan, \u201cAird: Adversarial learning framework for image repurposing detection,\u201d in Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), California, 2019, pp. 11330\u201311339.","DOI":"10.1109\/CVPR.2019.01159"},{"key":"727_CR62","doi-asserted-by":"publisher","unstructured":"T. Pomari, G. Ruppert, E. Rezende, A. Rocha, and T. Carvalho, \u201cImage Splicing Detection Through Illumination Inconsistencies and Deep Learning,\u201d in 2018 25th IEEE International Conference on Image Processing (ICIP), Athens: IEEE, Oct. 2018, pp. 3788\u20133792. https:\/\/doi.org\/10.1109\/ICIP.2018.8451227.","DOI":"10.1109\/ICIP.2018.8451227"},{"key":"727_CR63","doi-asserted-by":"publisher","unstructured":"M. Zampoglou, S. Papadopoulos, and Y. Kompatsiaris, \u201cDetecting image splicing in the wild (WEB),\u201d in 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Turin, Italy: IEEE, Jun. 2015, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICMEW.2015.7169839.","DOI":"10.1109\/ICMEW.2015.7169839"},{"key":"727_CR64","doi-asserted-by":"publisher","unstructured":"Y. Wu, W. Abd-Almageed, and P. Natarajan, \u201cDeep Matching and Validation Network: An End-to-End Solution to Constrained Image Splicing Localization and Detection,\u201d in Proceedings of the 25th ACM international conference on Multimedia, Mountain View California USA: ACM, Oct. 2017, pp. 1480\u20131502. https:\/\/doi.org\/10.1145\/3123266.3123411.","DOI":"10.1145\/3123266.3123411"},{"key":"727_CR65","doi-asserted-by":"publisher","unstructured":"J. Yang, Z. Lei, and S. Z. Li, \u201cLearn Convolutional Neural Network for Face Anti-Spoofing,\u201d Aug. 26, 2014, arXiv: arXiv:1408.5601. https:\/\/doi.org\/10.48550\/arXiv.1408.5601.","DOI":"10.48550\/arXiv.1408.5601"},{"key":"727_CR66","doi-asserted-by":"publisher","unstructured":"P. Korshunov and S. Marcel, \u201cSpeaker Inconsistency Detection in Tampered Video,\u201d in 2018 26th European Signal Processing Conference (EUSIPCO), Rome: IEEE, Sep. 2018, pp. 2375\u20132379. https:\/\/doi.org\/10.23919\/EUSIPCO.2018.8553270.","DOI":"10.23919\/EUSIPCO.2018.8553270"},{"key":"727_CR67","doi-asserted-by":"publisher","unstructured":"F. Marra, D. Gragnaniello, D. Cozzolino, and L. Verdoliva, \u201cDetection of GAN-Generated Fake Images over Social Networks,\u201d in 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), Miami, FL: IEEE, Apr. 2018, pp. 384\u2013389. https:\/\/doi.org\/10.1109\/MIPR.2018.00084.","DOI":"10.1109\/MIPR.2018.00084"},{"key":"727_CR68","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-031-23793-5_8","volume-title":"Computational Linguistics and Intelligent Text Processing: 19th International Conference, CICLing 2018, Hanoi, Vietnam, March 18\u201324, 2018, Revised Selected Papers, Part I","author":"G Krishnamurthy","year":"2023","unstructured":"Krishnamurthy, G., Majumder, N., Poria, S., Cambria, E.: A Deep Learning Approach for\u00a0Multimodal Deception Detection. In: Gelbukh, A. (ed.) Computational Linguistics and Intelligent Text Processing: 19th International Conference, CICLing 2018, Hanoi, Vietnam, March 18\u201324, 2018, Revised Selected Papers, Part I, pp. 87\u201396. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-23793-5_8"},{"key":"727_CR69","doi-asserted-by":"publisher","unstructured":"S. Tariq, S. Lee, H. Kim, Y. Shin, and S. S. Woo, \u201cDetecting Both Machine and Human Created Fake Face Images In the Wild,\u201d in Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, Toronto Canada: ACM, Jan. 2018, pp. 81\u201387. https:\/\/doi.org\/10.1145\/3267357.3267367.","DOI":"10.1145\/3267357.3267367"},{"key":"727_CR70","doi-asserted-by":"publisher","unstructured":"H. H. Nguyen, T. N.-D. Tieu, H.-Q. Nguyen-Son, V. Nozick, J. Yamagishi, and I. Echizen, \u201cModular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images,\u201d in Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg Germany: ACM, Aug. 2018, pp. 1\u201310. https:\/\/doi.org\/10.1145\/3230833.3230863.","DOI":"10.1145\/3230833.3230863"},{"key":"727_CR71","unstructured":"V. V. Kniaz, V. Knyaz, and F. Remondino, \u201cThe Point Where Reality Meets Fantasy: Mixed Adversarial Generators for Image Splice Detection\u201d."},{"key":"727_CR72","doi-asserted-by":"publisher","unstructured":"D. Guera and E. J. Delp, \u201cDeepfake Video Detection Using Recurrent Neural Networks,\u201d in 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Auckland, New Zealand: IEEE, Nov. 2018, pp. 1\u20136. https:\/\/doi.org\/10.1109\/AVSS.2018.8639163.","DOI":"10.1109\/AVSS.2018.8639163"},{"key":"727_CR73","doi-asserted-by":"publisher","unstructured":"H. H. Nguyen, J. Yamagishi, and I. Echizen, \u201cCapsule-forensics: Using Capsule Networks to Detect Forged Images and Videos,\u201d in ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom: IEEE, May 2019, pp. 2307\u20132311. https:\/\/doi.org\/10.1109\/ICASSP.2019.8682602.","DOI":"10.1109\/ICASSP.2019.8682602"},{"key":"727_CR74","doi-asserted-by":"publisher","unstructured":"L. Nataraj et al., \u201cDetecting GAN generated Fake Images using Co-occurrence Matrices,\u201d Oct. 03, 2019, arXiv: arXiv:1903.06836. https:\/\/doi.org\/10.48550\/arXiv.1903.06836.","DOI":"10.48550\/arXiv.1903.06836"},{"key":"727_CR75","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107616","volume":"174","author":"H Li","year":"2020","unstructured":"Li, H., Li, B., Tan, S., Huang, J.: Identification of deep network generated images using disparities in color components. Signal Process. 174, 107616 (2020). https:\/\/doi.org\/10.1016\/j.sigpro.2020.107616","journal-title":"Signal Process."},{"issue":"5","key":"727_CR76","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102610","volume":"58","author":"J Xue","year":"2021","unstructured":"Xue, J., Wang, Y., Tian, Y., Li, Y., Shi, L., Wei, L.: Detecting fake news by exploring the consistency of multimodal data. Inf. Process. Manage. 58(5), 102610 (2021). https:\/\/doi.org\/10.1016\/j.ipm.2021.102610","journal-title":"Inf. Process. Manage."},{"issue":"4","key":"727_CR77","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s41060-021-00302-z","volume":"13","author":"S Raza","year":"2022","unstructured":"Raza, S., Ding, C.: Fake news detection based on news content and social contexts: a transformer-based approach. Int J Data Sci Anal 13(4), 335\u2013362 (2022). https:\/\/doi.org\/10.1007\/s41060-021-00302-z","journal-title":"Int J Data Sci Anal"},{"key":"727_CR78","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111310","volume":"284","author":"TT Nguyen","year":"2024","unstructured":"Nguyen, T.T., Ren, Z., Nguyen, T.T., Jo, J., Nguyen, Q.V.H., Yin, H.: Portable graph-based rumour detection against multi-modal heterophily. Knowl.-Based Syst. 284, 111310 (2024). https:\/\/doi.org\/10.1016\/j.knosys.2023.111310","journal-title":"Knowl.-Based Syst."},{"issue":"2","key":"727_CR79","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101943","volume":"36","author":"W Liu","year":"2024","unstructured":"Liu, W., Cao, S., Zhang, S.: Multimodal consistency-specificity fusion based on information bottleneck for sentiment analysis. Journal of King Saud University - Computer and Information Sciences 36(2), 101943 (2024). https:\/\/doi.org\/10.1016\/j.jksuci.2024.101943","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"727_CR80","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109413","volume":"118","author":"L Wang","year":"2024","unstructured":"Wang, L., Zhang, Y., Zhou, B., Cao, S., Hu, K., Tan, Y.: Automatic depression prediction via cross-modal attention-based multi-modal fusion in social networks. Comput. Electr. Eng. 118, 109413 (2024). https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109413","journal-title":"Comput. Electr. Eng."},{"key":"727_CR81","doi-asserted-by":"publisher","unstructured":"N. Rahmouni, V. Nozick, J. Yamagishi, and I. Echizen, \u201cDistinguishing computer graphics from natural images using convolution neural networks,\u201d in 2017 IEEE Workshop on Information Forensics and Security (WIFS), Rennes: IEEE, Dec. 2017, pp. 1\u20136. https:\/\/doi.org\/10.1109\/WIFS.2017.8267647.","DOI":"10.1109\/WIFS.2017.8267647"},{"key":"727_CR82","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.image.2018.04.006","volume":"66","author":"ERS De Rezende","year":"2018","unstructured":"De Rezende, E.R.S., Ruppert, G.C.S., The\u00f3philo, A., Tokuda, E.K., Carvalho, T.: Exposing computer generated images by using deep convolutional neural networks. Signal Processing: Image Communication 66, 113\u2013126 (2018). https:\/\/doi.org\/10.1016\/j.image.2018.04.006","journal-title":"Signal Processing: Image Communication"},{"key":"727_CR83","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.eswa.2019.04.005","volume":"129","author":"LM Dang","year":"2019","unstructured":"Dang, L.M., Hassan, S.I., Im, S., Moon, H.: Face image manipulation detection based on a convolutional neural network. Expert Syst. Appl. 129, 156\u2013168 (2019). https:\/\/doi.org\/10.1016\/j.eswa.2019.04.005","journal-title":"Expert Syst. Appl."},{"key":"727_CR84","doi-asserted-by":"crossref","unstructured":"Y. Wu, W. AbdAlmageed, and P. Natarajan, \u201cManTra-Net: Manipulation Tracing Network for Detection and Localization of Image Forgeries With Anomalous Features,\u201d in Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), CVF, 2019, pp. 9543\u20139552.","DOI":"10.1109\/CVPR.2019.00977"},{"key":"727_CR85","doi-asserted-by":"publisher","unstructured":"S.-Y. Wang, O. Wang, R. Zhang, A. Owens, and A. Efros, \u201cDetecting Photoshopped Faces by Scripting Photoshop,\u201d in 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), Seoul, Korea (South): IEEE, Oct. 2019, pp. 10071\u201310080. https:\/\/doi.org\/10.1109\/ICCV.2019.01017.","DOI":"10.1109\/ICCV.2019.01017"},{"key":"727_CR86","doi-asserted-by":"publisher","unstructured":"P. Korshunov and S. Marcel, \u201cDeepFakes: a New Threat to Face Recognition? Assessment and Detection,\u201d Dec. 20, 2018, arXiv: arXiv:1812.08685. https:\/\/doi.org\/10.48550\/arXiv.1812.08685.","DOI":"10.48550\/arXiv.1812.08685"},{"key":"727_CR87","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11502","author":"Wu Zhe","year":"2018","unstructured":"Zhe, Wu., Singh, B., Larry Davis, V., Subrahmanian,: Deception Detection in Videos. Proceedings of the AAAI Conference on Artificial Intelligence (2018). https:\/\/doi.org\/10.1609\/aaai.v32i1.11502","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"727_CR88","doi-asserted-by":"publisher","unstructured":"V. P\u00e9rez-Rosas, M. Abouelenien, R. Mihalcea, and M. Burzo, \u201cDeception Detection using Real-life Trial Data,\u201d in Proceedings of the 2015 ACM on International Conference on Multimodal Interaction, Seattle Washington USA: ACM, Nov. 2015, pp. 59\u201366. https:\/\/doi.org\/10.1145\/2818346.2820758.","DOI":"10.1145\/2818346.2820758"},{"key":"727_CR89","doi-asserted-by":"publisher","unstructured":"Y. Li, M.-C. Chang, and S. Lyu, \u201cIn Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking,\u201d in 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, Hong Kong: IEEE, Dec. 2018, pp. 1\u20137. https:\/\/doi.org\/10.1109\/WIFS.2018.8630787.","DOI":"10.1109\/WIFS.2018.8630787"},{"key":"727_CR90","doi-asserted-by":"publisher","unstructured":"P. Bestagini, S. Milani, M. Tagliasacchi, and S. Tubaro, \u201cLocal tampering detection in video sequences,\u201d in 2013 IEEE 15th International Workshop on Multimedia Signal Processing (MMSP), Pula (CA), Italy: IEEE, Sep. 2013, pp. 488\u2013493. https:\/\/doi.org\/10.1109\/MMSP.2013.6659337.","DOI":"10.1109\/MMSP.2013.6659337"},{"key":"727_CR91","unstructured":"Gravitas: Is China hiding the real numbers of the Coronavirus outbreak? [Online Video]. Available: https:\/\/www.youtube.com\/watch?v=XaXeA3z2K7Q"},{"key":"727_CR92","unstructured":"B. Singh, \u201cFact Check: Did this girl rescue Koala bear from Australia Bushfire? No, this is a digitally created artwork,\u201d Vishvas News, 2020. [Online]. Available: https:\/\/www.vishvasnews.com\/english\/world\/fact-check-did-this-girl-rescue-koala-bear-from-australia-bushfire-no-this-is-a-digitally-created-artwork\/"},{"key":"727_CR93","unstructured":"S. Necessary and KETK, \u201cMedia reports say North Korean dictator Kim Jong Un dead,\u201d Kron4, San Fransisco, 2020. [Online]. Available: https:\/\/www.kron4.com\/news\/media-reports-say-north-korean-dictator-kim-jong-un-dead\/"},{"issue":"5","key":"727_CR94","doi-asserted-by":"publisher","first-page":"052010","DOI":"10.1088\/1757-899X\/662\/5\/052010","volume":"662","author":"NI Widiastuti","year":"2019","unstructured":"Widiastuti, N.I.: Convolution Neural Network for Text Mining and Natural Language Processing. IOP Conference Series: Materials Science and Engineering 662(5), 052010 (2019). https:\/\/doi.org\/10.1088\/1757-899X\/662\/5\/052010","journal-title":"IOP Conference Series: Materials Science and Engineering"},{"key":"727_CR95","doi-asserted-by":"publisher","unstructured":"A. A. M. Al-Saffar, H. Tao, and M. A. Talab, \u201cReview of deep convolution neural network in image classification,\u201d in 2017 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), Jakarta: IEEE, Oct. 2017, pp. 26\u201331. https:\/\/doi.org\/10.1109\/ICRAMET.2017.8253139.","DOI":"10.1109\/ICRAMET.2017.8253139"},{"key":"727_CR96","doi-asserted-by":"publisher","unstructured":"A. Karpathy, G. Toderici, S. Shetty, T. Leung, R. Sukthankar, and L. Fei-Fei, \u201cLarge-Scale Video Classification with Convolutional Neural Networks,\u201d in 2014 IEEE Conference on Computer Vision and Pattern Recognition, Columbus, OH, USA: IEEE, Jun. 2014, pp. 1725\u20131732. https:\/\/doi.org\/10.1109\/CVPR.2014.223.","DOI":"10.1109\/CVPR.2014.223"},{"issue":"12","key":"727_CR97","doi-asserted-by":"publisher","first-page":"15951","DOI":"10.1007\/s11042-018-6912-6","volume":"78","author":"RD Singh","year":"2019","unstructured":"Singh, R.D., Mittal, A., Bhatia, R.K.: 3D convolutional neural network for object recognition: a review. Multimed Tools Appl 78(12), 15951\u201315995 (2019). https:\/\/doi.org\/10.1007\/s11042-018-6912-6","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"727_CR98","doi-asserted-by":"publisher","first-page":"162","DOI":"10.21629\/JSEE.2017.01.18","volume":"28","author":"B Zhao","year":"2017","unstructured":"Zhao, B., et al.: Convolutional neural networks for time series classification. JSEE 28(1), 162\u2013169 (2017). https:\/\/doi.org\/10.21629\/JSEE.2017.01.18","journal-title":"JSEE"},{"key":"727_CR99","doi-asserted-by":"publisher","unstructured":"D. Kwon, K. Natarajan, S. C. Suh, H. Kim, and J. Kim, \u201cAn Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks,\u201d in 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna: IEEE, Jul. 2018, pp. 1595\u20131598. https:\/\/doi.org\/10.1109\/ICDCS.2018.00178.","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"727_CR100","doi-asserted-by":"publisher","unstructured":"J.-T. Huang, J. Li, and Y. Gong, \u201cAn analysis of convolutional neural networks for speech recognition,\u201d in 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), South Brisbane, Queensland, Australia: IEEE, Apr. 2015, pp. 4989\u20134993. https:\/\/doi.org\/10.1109\/ICASSP.2015.7178920.","DOI":"10.1109\/ICASSP.2015.7178920"},{"key":"727_CR101","doi-asserted-by":"publisher","unstructured":"M. M. Abu Ghosh and A. Y. Maghari, \u201cA Comparative Study on Handwriting Digit Recognition Using Neural Networks,\u201d in 2017 International Conference on Promising Electronic Technologies (ICPET), Deir El-Balah: IEEE, Oct. 2017, pp. 77\u201381. https:\/\/doi.org\/10.1109\/ICPET.2017.20.","DOI":"10.1109\/ICPET.2017.20"},{"issue":"8","key":"727_CR102","doi-asserted-by":"publisher","first-page":"5455","DOI":"10.1007\/s10462-020-09825-6","volume":"53","author":"A Khan","year":"2020","unstructured":"Khan, A., Sohail, A., Zahoora, U., Qureshi, A.S.: A survey of the recent architectures of deep convolutional neural networks. Artif. Intell. Rev. 53(8), 5455\u20135516 (2020). https:\/\/doi.org\/10.1007\/s10462-020-09825-6","journal-title":"Artif. Intell. Rev."},{"issue":"7","key":"727_CR103","doi-asserted-by":"publisher","first-page":"3639","DOI":"10.1109\/TGRS.2016.2636241","volume":"55","author":"L Mou","year":"2017","unstructured":"Mou, L., Ghamisi, P., Zhu, X.X.: Deep Recurrent Neural Networks for Hyperspectral Image Classification. IEEE Trans. Geosci. Remote Sensing 55(7), 3639\u20133655 (2017). https:\/\/doi.org\/10.1109\/TGRS.2016.2636241","journal-title":"IEEE Trans. Geosci. Remote Sensing"},{"key":"727_CR104","doi-asserted-by":"publisher","unstructured":"Joe Yue-Hei Ng, M. Hausknecht, S. Vijayanarasimhan, O. Vinyals, R. Monga, and G. Toderici, \u201cBeyond short snippets: Deep networks for video classification,\u201d in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA: IEEE, Jun. 2015, pp. 4694\u20134702. https:\/\/doi.org\/10.1109\/CVPR.2015.7299101.","DOI":"10.1109\/CVPR.2015.7299101"},{"key":"727_CR105","doi-asserted-by":"publisher","unstructured":"Ming Liang and Xiaolin Hu, \u201cRecurrent convolutional neural network for object recognition,\u201d in 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA: IEEE, Jun. 2015, pp. 3367\u20133375. https:\/\/doi.org\/10.1109\/CVPR.2015.7298958.","DOI":"10.1109\/CVPR.2015.7298958"},{"key":"727_CR106","doi-asserted-by":"publisher","unstructured":"P. Pan, Z. Xu, Y. Yang, F. Wu, and Y. Zhuang, \u201cHierarchical Recurrent Neural Encoder for Video Representation with Application to Captioning,\u201d in 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA: IEEE, Jun. 2016, pp. 1029\u20131038. https:\/\/doi.org\/10.1109\/CVPR.2016.117.","DOI":"10.1109\/CVPR.2016.117"},{"key":"727_CR107","doi-asserted-by":"publisher","unstructured":"P. G. Madhavan, \u201cRecurrent neural network for time series prediction,\u201d in Proceedings of the 15th Annual International Conference of the IEEE Engineering in Medicine and Biology Societ, San Diego, CA: IEEE, 1993, pp. 250\u2013251. https:\/\/doi.org\/10.1109\/IEMBS.1993.978527.","DOI":"10.1109\/IEMBS.1993.978527"},{"key":"727_CR108","unstructured":"P. Malhotra, L. Vig, G. Shroff, and P. Agarwal, \u201cLong Short Term Memory Networks for Anomaly Detection in Time Series,\u201d Computational Intelligence, 2015."},{"key":"727_CR109","unstructured":"J. Ruales, \u201cRecurrent Neural Networks for Sentiment Analysis\u201d."},{"key":"727_CR110","doi-asserted-by":"publisher","unstructured":"M. Moayeri et al., \u201cRethinking Artistic Copyright Infringements in the Era of Text-to-Image Generative Models,\u201d Apr. 11, 2024, arXiv: arXiv:2404.08030. https:\/\/doi.org\/10.48550\/arXiv.2404.08030.","DOI":"10.48550\/arXiv.2404.08030"},{"key":"727_CR111","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-031-09680-8_25","volume-title":"Intelligent Tutoring Systems: 18th International Conference, ITS 2022, Bucharest, Romania, June 29 \u2013 July 1, 2022, Proceedings","author":"F Aprin","year":"2022","unstructured":"Aprin, F., Irene-Angelica Chounta, H., Hoppe, U.: \u201cSee the Image in Different Contexts\u201d: Using Reverse Image Search to Support the Identification of Fake News in Instagram-Like Social Media. In: Crossley, S., Popescu, E. (eds.) Intelligent Tutoring Systems: 18th International Conference, ITS 2022, Bucharest, Romania, June 29 \u2013 July 1, 2022, Proceedings, pp. 264\u2013275. Springer International Publishing, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-09680-8_25"},{"issue":"3","key":"727_CR112","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13171","volume":"40","author":"GB Lima","year":"2023","unstructured":"Lima, G.B., Chaves, T.D.M., Freitas, W.W.L., De Souza, R.M.C.R.: Statistical learning from Brazilian fake news. Expert. Syst. 40(3), e13171 (2023). https:\/\/doi.org\/10.1111\/exsy.13171","journal-title":"Expert. Syst."},{"key":"727_CR113","doi-asserted-by":"publisher","unstructured":"J. Zhu, C. Gao, Z. Yin, X. Li, and J. Kurths, \u201cPropagation Structure-Aware Graph Transformer for Robust and Interpretable Fake News Detection,\u201d in Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Barcelona Spain: ACM, Aug. 2024, pp. 4652\u20134663. https:\/\/doi.org\/10.1145\/3637528.3672024.","DOI":"10.1145\/3637528.3672024"},{"key":"727_CR114","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1609\/icwsm.v14i1.7329","volume":"14","author":"K Shu","year":"2020","unstructured":"Shu, K., Mahudeswaran, D., Wang, S., Liu, H.: Hierarchical Propagation Networks for Fake News Detection: Investigation and Exploitation. ICWSM 14, 626\u2013637 (2020). https:\/\/doi.org\/10.1609\/icwsm.v14i1.7329","journal-title":"ICWSM"},{"issue":"5","key":"727_CR115","doi-asserted-by":"publisher","first-page":"2144","DOI":"10.3758\/s13428-017-0982-7","volume":"50","author":"H Li","year":"2018","unstructured":"Li, H., Cai, Z., Graesser, A.C.: Computerized summary scoring: crowdsourcing-based latent semantic analysis. Behav Res 50(5), 2144\u20132161 (2018). https:\/\/doi.org\/10.3758\/s13428-017-0982-7","journal-title":"Behav Res"},{"key":"727_CR116","doi-asserted-by":"publisher","unstructured":"G. Antoniol and M. Di Penta, 2004 \u201cA distributed architecture for dynamic analyses on user-profile data,\u201d in Eighth European Conference on Software Maintenance and Reengineering, 2004. CSMR 2004. Proceedings., Tampere, Finland: IEEE, , pp. 319\u2013328. https:\/\/doi.org\/10.1109\/CSMR.2004.1281434.","DOI":"10.1109\/CSMR.2004.1281434"},{"key":"727_CR117","doi-asserted-by":"publisher","unstructured":"Tahmasebzadeh, G., Kacupaj, E., M\u00fcller-Budack, E., Hakimov, S., Lehmann, J., Ewerth, R.: GeoWINE: geolocation based wiki, image, news and event retrieval. In: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, Virtual Event Canada: ACM, Jul. 2021, pp. 2565\u20132569. https:\/\/doi.org\/10.1145\/3404835.3462786","DOI":"10.1145\/3404835.3462786"},{"key":"727_CR118","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2021.101960","volume":"138","author":"A Giachanou","year":"2022","unstructured":"Giachanou, A., Ghanem, B., R\u00edssola, E.A., Rosso, P., Crestani, F., Oberski, D.: The impact of psycholinguistic patterns in discriminating between fake news spreaders and fact checkers. Data Knowl. Eng. 138, 101960 (2022). https:\/\/doi.org\/10.1016\/j.datak.2021.101960","journal-title":"Data Knowl. Eng."},{"key":"727_CR119","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.inffus.2020.06.014","volume":"64","author":"R Tolosana","year":"2020","unstructured":"Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., Ortega-Garcia, J.: Deepfakes and beyond: A Survey of face manipulation and fake detection. Information Fusion 64, 131\u2013148 (2020). https:\/\/doi.org\/10.1016\/j.inffus.2020.06.014","journal-title":"Information Fusion"},{"issue":"5","key":"727_CR120","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/JSTSP.2020.3007250","volume":"14","author":"JC Neves","year":"2020","unstructured":"Neves, J.C., Tolosana, R., Vera-Rodriguez, R., Lopes, V., Proenca, H., Fierrez, J.: GANprintR: Improved Fakes and Evaluation of the State of the Art in Face Manipulation Detection. IEEE J. Sel. Top. Signal Process. 14(5), 1038\u20131048 (2020). https:\/\/doi.org\/10.1109\/JSTSP.2020.3007250","journal-title":"IEEE J. Sel. Top. Signal Process."},{"issue":"2","key":"727_CR121","doi-asserted-by":"publisher","first-page":"168","DOI":"10.3390\/math10020168","volume":"10","author":"N Akhtar","year":"2022","unstructured":"Akhtar, N., Saddique, M., Asghar, K., Bajwa, U.I., Hussain, M., Habib, Z.: Digital Video Tampering Detection and Localization: Review, Representations, Challenges and Algorithm. Mathematics 10(2), 168 (2022). https:\/\/doi.org\/10.3390\/math10020168","journal-title":"Mathematics"},{"issue":"4","key":"727_CR122","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1978802.1978805","volume":"43","author":"A Rocha","year":"2011","unstructured":"Rocha, A., Scheirer, W., Boult, T., Goldenstein, S.: Vision of the unseen: Current trends and challenges in digital image and video forensics. ACM Comput. Surv. 43(4), 1\u201342 (2011). https:\/\/doi.org\/10.1145\/1978802.1978805","journal-title":"ACM Comput. Surv."},{"key":"727_CR123","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2015.08.008","volume":"39","author":"MA Qureshi","year":"2015","unstructured":"Qureshi, M.A., Deriche, M.: A bibliography of pixel-based blind image forgery detection techniques. Signal Processing: Image Communication 39, 46\u201374 (2015). https:\/\/doi.org\/10.1016\/j.image.2015.08.008","journal-title":"Signal Processing: Image Communication"},{"key":"727_CR124","doi-asserted-by":"publisher","unstructured":"D. Brezeale and D. J. Cook, \u201cAutomatic Video Classification: A Survey of the Literature,\u201d IEEE Trans. Syst., Man, Cybern. C, vol. 38, no. 3, pp. 416\u2013430, May 2008, https:\/\/doi.org\/10.1109\/TSMCC.2008.919173.","DOI":"10.1109\/TSMCC.2008.919173"},{"issue":"12","key":"727_CR125","doi-asserted-by":"publisher","first-page":"15545","DOI":"10.1007\/s11042-017-5132-9","volume":"77","author":"C Boididou","year":"2018","unstructured":"Boididou, C., et al.: Verifying information with multimedia content on twitter: A comparative study of automated approaches. Multimed Tools Appl 77(12), 15545\u201315571 (2018). https:\/\/doi.org\/10.1007\/s11042-017-5132-9","journal-title":"Multimed Tools Appl"},{"key":"727_CR126","doi-asserted-by":"publisher","unstructured":"K. Anoop, M. P. Gangan, D. P, and V. L. Lajish, \u201cLeveraging Heterogeneous Data for Fake News Detection,\u201d in Linking and Mining Heterogeneous and Multi-view Data, Springer, 2018. [Online]. Available: https:\/\/doi.org\/10.1007\/978-3-030-01872-6_10","DOI":"10.1007\/978-3-030-01872-6_10"},{"key":"727_CR127","doi-asserted-by":"publisher","unstructured":"N. Saini, M. Singhal, M. Tanwar, and P. Meel, \u201cMultimodal, Semi-supervised and Unsupervised web content credibility analysis Frameworks,\u201d in 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India: IEEE, May 2020, pp. 948\u2013955. https:\/\/doi.org\/10.1109\/ICICCS48265.2020.9121005.","DOI":"10.1109\/ICICCS48265.2020.9121005"},{"key":"727_CR128","doi-asserted-by":"publisher","unstructured":"K. Nakamura, S. Levy, and W. Y. Wang, \u201cr\/Fakeddit: A New Multimodal Benchmark Dataset for Fine-grained Fake News Detection,\u201d Mar. 12, 2020, arXiv: arXiv:1911.03854. https:\/\/doi.org\/10.48550\/arXiv.1911.03854.","DOI":"10.48550\/arXiv.1911.03854"},{"key":"727_CR129","unstructured":"S. Jindal, R. Sood, R. Singh, M. Vatsa, and T. Chakraborty, \u201cNewsBag: A Multimodal Benchmark Dataset for Fake News Detection\u201d."},{"key":"727_CR130","doi-asserted-by":"publisher","unstructured":"X. Zhou, A. Mulay, E. Ferrara, and R. Zafarani, \u201cReCOVery: A Multimodal Repository for COVID-19 News Credibility Research,\u201d in Proceedings of the 29th ACM International Conference on Information & Knowledge Management, Virtual Event Ireland: ACM, Oct. 2020, pp. 3205\u20133212. https:\/\/doi.org\/10.1145\/3340531.3412880.","DOI":"10.1145\/3340531.3412880"},{"key":"727_CR131","doi-asserted-by":"publisher","unstructured":"J. C. S. Reis, P. Melo, K. Garimella, J. M. Almeida, D. Eckles, and F. Benevenuto, 2020 \u201cA Dataset of Fact-Checked Images Shared on WhatsApp During the Brazilian and Indian Elections,\u201d in Proceedings of the International AAAI Conference on Web and Social Media, Archives, https:\/\/doi.org\/10.1609\/icwsm.v14i1.7356.","DOI":"10.1609\/icwsm.v14i1.7356"},{"issue":"2","key":"727_CR132","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103193","volume":"60","author":"D Chen","year":"2023","unstructured":"Chen, D., Su, W., Wu, P., Hua, B.: Joint multimodal sentiment analysis based on information relevance. Inf. Process. Manage. 60(2), 103193 (2023). https:\/\/doi.org\/10.1016\/j.ipm.2022.103193","journal-title":"Inf. Process. Manage."}],"container-title":["International Journal of Data Science and Analytics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00727-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41060-025-00727-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41060-025-00727-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T10:48:11Z","timestamp":1758797291000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41060-025-00727-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,5]]},"references-count":132,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["727"],"URL":"https:\/\/doi.org\/10.1007\/s41060-025-00727-w","relation":{},"ISSN":["2364-415X","2364-4168"],"issn-type":[{"value":"2364-415X","type":"print"},{"value":"2364-4168","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,5]]},"assertion":[{"value":"20 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}