{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T22:33:23Z","timestamp":1770676403360,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:00:00Z","timestamp":1770595200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:00:00Z","timestamp":1770595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Soc Sc"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s42001-026-00461-8","type":"journal-article","created":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T05:36:51Z","timestamp":1770615411000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond keywords: modeling the semantic complexity of deceptive communication on instant messaging platforms"],"prefix":"10.1007","volume":"9","author":[{"given":"Shuo","family":"Xu","sequence":"first","affiliation":[]},{"given":"Zhanyi","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Zijing","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Chao Peter","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yixiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuanjie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hailiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,9]]},"reference":[{"key":"461_CR1","doi-asserted-by":"publisher","first-page":"168261","DOI":"10.1109\/ACCESS.2019.2954791","volume":"7","author":"A Karim","year":"2019","unstructured":"Karim, A., Azam, S., Shanmugam, B., Kannoorpatti, K., & Alazab, M. (2019). A comprehensive survey for intelligent spam email detection. IEEE Access, 7, 168261\u2013168295. https:\/\/doi.org\/10.1109\/ACCESS.2019.2954791","journal-title":"IEEE Access"},{"key":"461_CR2","doi-asserted-by":"publisher","unstructured":"Pattanaik, C. B., Das, S., Arsh, A., & Kar, N. (2023). A survey on phishing attacks and their counter-measures. In: Reddy, V.S., Prasad, V.K., Wang, J., Rao\u00a0Dasari, N.M. (eds.) Intelligent Systems and Sustainable Computing (ICISSC 2022). Smart Innovation, Systems and Technologies, vol. 363. Springer, Singapore . https:\/\/doi.org\/10.1007\/978-981-99-4717-1_45","DOI":"10.1007\/978-981-99-4717-1_45"},{"key":"461_CR3","volume-title":"Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions that Shape Social Media","author":"T Gillespie","year":"2018","unstructured":"Gillespie, T. (2018). Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions that Shape Social Media. New Haven, CT: Yale University Press."},{"issue":"1","key":"461_CR4","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1108\/eb026526","volume":"28","author":"KS Jones","year":"1972","unstructured":"Jones, K. S. (1972). A statistical interpretation of term specificity and its application in retrieval. Journal of Documentation, 28(1), 11\u201321. https:\/\/doi.org\/10.1108\/eb026526","journal-title":"Journal of Documentation"},{"key":"461_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/0471722146","volume-title":"Applied Logistic Regression","author":"DW Hosmer","year":"2000","unstructured":"Hosmer, D. W., & Lemeshow, S. (2000). Applied Logistic Regression (2nd ed.). New York, NY: John Wiley & Sons Inc.","edition":"2"},{"issue":"1","key":"461_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5\u201332.","journal-title":"Machine Learning"},{"key":"461_CR7","unstructured":"Ke, G., Meng, Q., Finley, T., Wang, T., Chen, W., Ma, W., Ye, Q., & Liu, T. -Y. (2017). LightGBM: A highly efficient gradient boosting decision tree. In: Proceedings of the 31st International Conference on Neural Information Processing Systems (NeurIPS), 3149\u20133157"},{"key":"461_CR8","doi-asserted-by":"crossref","unstructured":"Cho, K., Merri\u00ebnboer, B., Gulcehre, C., Bahdanau, D., Bougares, F., Schwenk, H., & Bengio, Y. (2014). Learning phrase representations using RNN encoder\u2013decoder for statistical machine translation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), 1724\u20131734","DOI":"10.3115\/v1\/D14-1179"},{"key":"461_CR9","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., & Soricut, R. (2020). ALBERT: A Lite BERT for self-supervised learning of language representations. In: Proceedings of the 8th International Conference on Learning Representations (ICLR)"},{"key":"461_CR10","doi-asserted-by":"crossref","unstructured":"Cao, Y., Dai, J., Wang, Z., Zhang, Y., Shen, X., Liu, Y., & Tian, Y. (2025). Machine learning approaches for depression detection on social media: A systematic review of biases and methodological challenges. Journal of Behavioral Data Science 5(1)","DOI":"10.35566\/jbds\/caoyc"},{"key":"461_CR11","doi-asserted-by":"publisher","first-page":"6157","DOI":"10.1007\/s41060-025-00850-8","volume":"20","author":"Y Liu","year":"2025","unstructured":"Liu, Y., Shen, X., Zhang, Y., Wang, Z., Tian, Y., Dai, J., & Cao, Y. (2025). A systematic review of machine learning approaches for detecting deceptive activities on social media: methods, challenges, and biases. International Journal of Data Science and Analytics, 20, 6157\u20136182.","journal-title":"International Journal of Data Science and Analytics"},{"issue":"8","key":"461_CR12","doi-asserted-by":"publisher","first-page":"186","DOI":"10.3390\/computation13080186","volume":"13","author":"Y Zhang","year":"2025","unstructured":"Zhang, Y., Wang, Z., Ding, Z., Tian, Y., Dai, J., Shen, X., Liu, Y., & Cao, Y. (2025). Employing machine learning and deep learning models for mental illness detection. Computation, 13(8), 186.","journal-title":"Computation"},{"key":"461_CR13","doi-asserted-by":"publisher","first-page":"14497","DOI":"10.1038\/s41598-025-99167-6","volume":"15","author":"Z Ding","year":"2025","unstructured":"Ding, Z., Wang, Z., Zhang, Y., Cao, Y., Liu, Y., Shen, X., Tian, Y., & Dai, J. (2025). Trade-offs between machine learning and deep learning for mental illness detection on social media. Scientific Reports, 15, 14497.","journal-title":"Scientific Reports"},{"key":"461_CR14","unstructured":"Mexwell, M. O. (2022). Telegram Spam or Ham. Kaggle. https:\/\/www.kaggle.com\/datasets\/morninew\/telegram-spam-or-ham-dataset"},{"key":"461_CR15","volume-title":"Classification and Regression Trees","author":"L Breiman","year":"1984","unstructured":"Breiman, L., Friedman, J. H., Olshen, R. A., & Stone, C. J. (1984). Classification and Regression Trees. Monterey, CA: Wadsworth & Brooks\/Cole Advanced Books & Software."},{"issue":"20","key":"461_CR16","doi-asserted-by":"publisher","first-page":"2086","DOI":"10.3390\/math13132086","volume":"13","author":"Y Tian","year":"2025","unstructured":"Tian, Y., Xu, S., Cao, Y., Wang, Z., & Wei, Z. (2025). An empirical comparison of machine learning and deep learning models for automated fake news detection. Mathematics, 13(20), 2086.","journal-title":"Mathematics"},{"key":"461_CR17","doi-asserted-by":"crossref","unstructured":"Xu, S., Tian, Y., Cao, Y., Wang, Z., & Wei, Z. (2025). Benchmarking machine learning and deep learning models for fake news detection using news headlines. Preprints . article 2025061183","DOI":"10.20944\/preprints202506.1183.v1"},{"issue":"5","key":"461_CR18","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman, J. H. (2001). Greedy function approximation: A gradient boosting machine. Annals of Statistics, 29(5), 1189\u20131232.","journal-title":"Annals of Statistics"},{"key":"461_CR19","unstructured":"Devlin, J., Chang, M. -W., Lee, K., & Toutanova, K. (2019). Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805"},{"issue":"2","key":"461_CR20","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/BF02295996","volume":"12","author":"Q McNemar","year":"1947","unstructured":"McNemar, Q. (1947). Note on the sampling error of the difference between correlated proportions or percentages. Psychometrika, 12(2), 153\u2013157. https:\/\/doi.org\/10.1007\/BF02295996","journal-title":"Psychometrika"}],"container-title":["Journal of Computational Social Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-026-00461-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42001-026-00461-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-026-00461-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T05:36:53Z","timestamp":1770615413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42001-026-00461-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,9]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["461"],"URL":"https:\/\/doi.org\/10.1007\/s42001-026-00461-8","relation":{},"ISSN":["2432-2717","2432-2725"],"issn-type":[{"value":"2432-2717","type":"print"},{"value":"2432-2725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,9]]},"assertion":[{"value":"28 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no financial or non-financial interests that are directly or indirectly related to the work submitted for publication.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that no funds, grants, or other support were received during the preparation of this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"All work was conducted as independent researchers.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"29"}}