{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T12:09:50Z","timestamp":1775304590475,"version":"3.50.1"},"reference-count":185,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2018.2886314","type":"journal-article","created":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T14:53:12Z","timestamp":1544539992000},"page":"2828-2855","source":"Crossref","is-referenced-by-count":90,"title":["Credibility in Online Social Networks: A Survey"],"prefix":"10.1109","volume":"7","author":[{"given":"Majed","family":"Alrubaian","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7594-7325","authenticated-orcid":false,"given":"Muhammad","family":"Al-Qurishi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1887-5193","authenticated-orcid":false,"given":"Atif","family":"Alamri","sequence":"additional","affiliation":[]},{"given":"Mabrook","family":"Al-Rakhami","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3479-3606","authenticated-orcid":false,"given":"Mohammad Mehedi","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Fortino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.9"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3873"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/2682862.2682873"},{"key":"ref174","year":"2014","journal-title":"How to Report Spam in Twitter?"},{"key":"ref173","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-319-51367-6_3","article-title":"A credibility assessment model for online social network content","author":"alrubaian","year":"2017","journal-title":"From Social Data Mining and Analysis to Prediction and Community Detection"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380724"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742569"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07617-1_45"},{"key":"ref177","first-page":"1589","article-title":"Rumor has it: Identifying misinformation in microblogs","author":"qazvinian","year":"2011","journal-title":"Proc Conf Empirical Methods Natural Lang Process"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.002"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12084"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-540-68504-3_5","article-title":"Website credibility, active trust and behavioural intent","author":"cugelman","year":"2008","journal-title":"Proceedings of the 3rd International Conference on Persuasive Technology"},{"key":"ref38","author":"solomon","year":"2014","journal-title":"Consumer Behavior Buying Having and Being"},{"key":"ref33","first-page":"1434","article-title":"A multistage credibility analysis model for microblogs","author":"alrubaian","year":"2015","journal-title":"Proc Int Conf Adv Social Netw Anal Mining"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1515\/9781400833993","volume":"3","author":"jackson","year":"2008","journal-title":"Social and Economic Networks"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6170-8_191"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.10.001"},{"key":"ref37","first-page":"441","article-title":"Paradoxes of the Web: The ethical dimensions of credibility","volume":"49","author":"burbules","year":"2001","journal-title":"Library Trends"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"ref35","article-title":"An analysis of credibility in microblogs","author":"kang","year":"2012"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1341531.1341557"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1209"},{"key":"ref180","article-title":"Deconstructing information credibility on Twitter","author":"kang","year":"2013","journal-title":"Proc Int World Wide Web Conf"},{"key":"ref185","first-page":"205","article-title":"Measuring opinion credibility in Twitter","author":"thandar","year":"2015","journal-title":"Recent Advances in Information and Communication Technology"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0463-1"},{"key":"ref183","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.chb.2016.11.009","article-title":"Exploring the credibility of online celebrities&#x2019; Instagram profiles in influencing the purchase decisions of young female users","volume":"68","author":"djafarova","year":"2017","journal-title":"Comput Hum Behav"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-017-9309-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1108\/IJWIS-04-2014-0019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1561\/1100000007"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130605"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1108\/17440081111141772"},{"key":"ref20","first-page":"1","article-title":"Web credibility assessment: Affecting factors and assessment techniques","volume":"20","author":"shah","year":"2015","journal-title":"Inf Res"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23543"},{"key":"ref21","article-title":"Ranking user generated Web content","author":"si","year":"2015"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/aris.2007.1440410114"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-011-9182-8"},{"key":"ref101","first-page":"174","article-title":"Features for measuring credibility on Facebook information","volume":"9","author":"saikaew","year":"2015","journal-title":"Int J Comput Autom Control Inf Eng"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4018\/jitwe.2008070102"},{"key":"ref100","article-title":"Analyzing and measuring trustworthiness of user-generated content on Twitter to study high-impact events","author":"joshi","year":"2013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.08.071"},{"key":"ref50","first-page":"1","article-title":"Finding true and credible information on Twitter","author":"sikdar","year":"2014","journal-title":"Proc 17th Int Conf Inf Fusion"},{"key":"ref51","article-title":"Faking sandy: Characterizing and identifying fake images on Twitter during hurricane sandy","author":"lamba","year":"0"},{"key":"ref154","first-page":"1","article-title":"New metrics for newsblog credibility","author":"ulicny","year":"2007","journal-title":"Proc Int Conf Weblogs Social Media"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.08.013"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.4275\/KSLIS.2010.44.4.155"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1002\/meet.2011.14504801110"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01448.x"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.071"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-06-2014-0128"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2010.90"},{"key":"ref147","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/978-3-319-03260-3_26","article-title":"Aspects of rumor spreading on a microblog network","author":"kwon","year":"2013","journal-title":"Social Informatics"},{"key":"ref148","first-page":"1","article-title":"Audience-aware credibility: From understanding audience to establishing credible blogs","author":"rieh","year":"2014","journal-title":"Proc Int'l AAAI Conf Weblogs and Social Media"},{"key":"ref149","article-title":"Believe it or not? Analyzing information credibility in microblogs","author":"kang","year":"0"},{"key":"ref59","first-page":"1","article-title":"Credo: A framework for semi-supervised credibility assessment for social networks","author":"nagy","year":"2012","journal-title":"Proc Int Conf Data Mining"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-319-13734-6_16","article-title":"TweetCred: Real-time credibility assessment of content on Twitter","author":"gupta","year":"2014","journal-title":"Social Informatics"},{"key":"ref57","first-page":"285","article-title":"Measuring the credibility of Arabic text content in Twitter","author":"al-eid","year":"2010","journal-title":"Proc 5th Int Conf Digit Inf Manag"},{"key":"ref56","first-page":"618","article-title":"Towards the measurement of Arabic Weblogs credibility automatically","author":"al-eidan","year":"2009","journal-title":"Proc 11th Int Conf Inf Integr Web-Based Appl Services"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"157","DOI":"10.7494\/csci.2015.16.2.157","article-title":"Automated credibility assessment on Twitter","volume":"16","author":"lorek","year":"2015","journal-title":"Comput Sci"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2185354.2185356"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964869"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579323"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/cb.1496"},{"key":"ref167","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/978-3-319-06028-6_50","article-title":"User perception of information credibility of news on Twitter","author":"shariff","year":"2014","journal-title":"Advances in Information Retrieval"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.046"},{"key":"ref165","first-page":"1212","article-title":"Using Arabic microblogs features in determining credibility","author":"almansour","year":"2015","journal-title":"Proc Int Conf Adv Social Netw Anal Mining"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1186\/2196-064X-1-5"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0163-y"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488132"},{"key":"ref161","first-page":"1","article-title":"Trusting tweets: The Fukushima disaster and information source credibility on Twitter","author":"thomson","year":"2012","journal-title":"Proc of the 9th Inter ISCRAM Conf"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2258551"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.08.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.09.034"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2753202"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TBDATA.2017.2711040","article-title":"A situational analytic method for user behavior pattern in multimedia social networks","volume":"24","author":"zhang","year":"2017","journal-title":"IEEE Trans Big Data"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2010.06.001"},{"key":"ref8","first-page":"107","article-title":"A user-centric feature identification and modeling approach to infer social ties in OSNs","author":"wani","year":"2013","journal-title":"Proc Int Conf Inform Integr Web-Based Appl Services"},{"key":"ref49","first-page":"151","article-title":"Cutting through the noise: Defining ground truth in information credibility on Twitter","volume":"2","author":"sikdar","year":"2013","journal-title":"Proc Human"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.015"},{"key":"ref157","first-page":"151","article-title":"The context of content: The impact of source and setting on the credibility of news","volume":"40","author":"bakker","year":"2013","journal-title":"Recherches Commun"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2010.534798"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/0002764217708585"},{"key":"ref46","author":"imran","year":"2014","journal-title":"Processing Social Media Messages in Mass Emergency A Survey"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"ref48","first-page":"218","article-title":"Towards customizing credibility in different contexts: Languages, topics and locations&#x2014;A Twitter case study","author":"almansour","year":"2013","journal-title":"Proc Int Conf Digit Inf Process e-Bus Cloud Comput"},{"key":"ref47","doi-asserted-by":"crossref","DOI":"10.1145\/2637748.2638439","article-title":"Evaluation of credibility assessment for microblogging: Models and future directions","author":"almansour","year":"2014","journal-title":"Proc of the 14th Int Conf on Knowledge Technologies and Data-driven Business"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1108\/03090560710773318"},{"key":"ref41","first-page":"1","article-title":"Examining user perceptions of third-party organizations credibility and trust in an e-retailer","volume":"18","author":"wakefield","year":"2007","journal-title":"J Org User Comput"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","article-title":"A survey of trust in computer science and the semantic Web","volume":"5","author":"artz","year":"2007","journal-title":"J Web Semantics"},{"key":"ref127","first-page":"1","article-title":"FaceTrust: Assessing the credibility of online personas via social networks","author":"sirivianos","year":"2009","journal-title":"Proc USENIX Conf Hot Topics Secur"},{"key":"ref126","first-page":"45","article-title":"Ranking assessment of event tweets for credibility","volume":"1","author":"kumar","year":"2013","journal-title":"Int J Sci Eng Res"},{"key":"ref125","first-page":"39","article-title":"A framework for modeling trust in collaborative ontologies","author":"kang","year":"2011","journal-title":"Proc 6th Graduate Student Workshop Comput"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.149"},{"key":"ref73","first-page":"91","article-title":"Classifying political orientation on Twitter: It&#x2019;s not easy!","author":"cohen","year":"2013","journal-title":"Proc Int'l AAAI Conf Weblogs and Social Media"},{"key":"ref72","first-page":"205","article-title":"Measuring opinion credibility in Twitter","author":"thandar","year":"2015","journal-title":"Recent Advances in Information and Communication Technology"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.4236\/psych.2015.63029"},{"key":"ref71","first-page":"51","article-title":"Estimating user credibility in multimedia information flows","author":"ginsca","year":"2013","journal-title":"Proc 5th BCS-IRSG Symp Future Directions Inf Access (FDIA)"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805772"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2741752"},{"key":"ref76","first-page":"10","article-title":"What&#x2019;s in a name? Using first names as features for gender inference in Twitter","author":"liu","year":"2013","journal-title":"Proc AAAI Spring Symp Anal Microtext"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.pragma.2013.07.012"},{"key":"ref77","article-title":"What&#x2019;s in a @name? How name value biases judgment of microblog authors","author":"pal","year":"2011","journal-title":"Proc 5th Int AAAI Conf Weblogs Social Media"},{"key":"ref74","first-page":"1301","article-title":"Discriminating gender on Twitter","author":"burger","year":"2011","journal-title":"Proc Conf Empirical Methods Natural Lang Process"},{"key":"ref75","first-page":"387","article-title":"Homophily and latent attribute inference: Inferring latent attributes of Twitter users from neighbors","author":"al zamal","year":"2013","journal-title":"Proc Int'l AAAI Conf Weblogs and Social Media"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579324"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492574"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-014-0014-x"},{"key":"ref78","first-page":"1","article-title":"Detecting latent user properties in social media","author":"rao","year":"2010","journal-title":"Proc NIPS Workshop"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.09.001"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504731"},{"key":"ref136","article-title":"Computational cognitive modeling","author":"\u0161tep\u00e1nov\u00e1","year":"2015"},{"key":"ref135","article-title":"Measuring social media credibility: A study on a measure of blog credibility","author":"kang","year":"2010"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2014.6816536"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348361"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/978-3-642-37401-2_14","article-title":"Detecting event rumors on Sina Weibo automatically","author":"sun","year":"2013","journal-title":"Web Technologies and Applications"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/1629890.1629907"},{"key":"ref62","first-page":"3","article-title":"Verifying multimedia use at MediaEval 2015","author":"boididou","year":"2015","journal-title":"Proc Mediaeval Workshop"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963301"},{"key":"ref63","first-page":"3","article-title":"Extracting attributed verification and debunking reports from social media: MediaEval-2015 trust and credibility analysis of image and video","author":"middleton","year":"2015","journal-title":"Proc Mediaeval Workshop"},{"key":"ref64","first-page":"1","article-title":"The CERTH-UNITN participation @ verifying multimedia use 2015","author":"boididou","year":"2015","journal-title":"Proc Mediaeval Workshop"},{"key":"ref140","first-page":"1","article-title":"Applications of topics models to analysis of disaster-related Twitter data","author":"kireyev","year":"2009","journal-title":"Proc NIPS Workshop Appl Topic Models Text and Beyond"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24027-5_4"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1504\/IJEM.2009.031564"},{"key":"ref66","first-page":"1","article-title":"Sentiment analysis on bad news spreading","author":"park","year":"2012","journal-title":"Proc ACM CSCW Workshop Design Influence Social Technol"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.128"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2166966.2166998"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1145\/2145204.2145274","article-title":"Tweeting is believing? Understanding microblog credibility perceptions","author":"morris","year":"2012","journal-title":"Proc ACM Conf Comput Supported Cooperat Work"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.796"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1080\/01463373.2012.688723"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2701375"},{"key":"ref69","first-page":"540","article-title":"Modeling credibility assessment and explanation for tweets based on sentiment analysis","volume":"70","author":"widyantoro","year":"2014","journal-title":"J Theor Appl Inf Technol"},{"key":"ref145","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1145\/2441776.2441841","article-title":"Microblog credibility perceptions: Comparing the United States and China","author":"yang","year":"2013","journal-title":"Proc Conf Comput Supported Cooperat Work"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435785"},{"key":"ref109","first-page":"483","article-title":"Detecting marionette microblog users for improved information credibility","author":"wu","year":"2013","journal-title":"Machine Learning and Knowledge Discovery in Databases"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.14"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488131"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1108\/IntR-05-2012-0095"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2786451.2786512"},{"key":"ref93","article-title":"@Twitter credibility ranking of tweets on events # breakingnews","author":"gupta","year":"2012"},{"key":"ref106","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-642-30428-6_4","article-title":"Information credibility on Twitter in emergency situation","author":"xia","year":"2012","journal-title":"Intelligence and Security Informatics"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631786"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.5120\/14456-2729"},{"key":"ref91","first-page":"1","article-title":"Finding true and credible information on Twitter","author":"sikdar","year":"2014","journal-title":"Proc 17th Int Conf Inf Fusion (FUSION)"},{"key":"ref104","article-title":"Twit-digest: An online solution for analyzing and visualizing Twitter in real-time","author":"gupta","year":"0"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.91"},{"key":"ref103","article-title":"Trails of trustworthiness in real-time streams (extended summary)","author":"metaxas","year":"0"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2014.6818354"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37401-2_33"},{"key":"ref112","first-page":"1","article-title":"Credibility-based social network recommendation: Follow the leader","author":"al-sharawneh","year":"2010","journal-title":"Proc AISC"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1007\/978-3-642-37210-0_48","article-title":"Measuring user credibility in social media","author":"abbasi","year":"2013","journal-title":"Social Computing Behavioral-Cultural Modeling and Prediction"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/978-3-642-36973-5_47","article-title":"Web credibility: Features exploration and credibility prediction","author":"olteanu","year":"2013","journal-title":"Advances in Information Retrieval"},{"key":"ref99","first-page":"655","article-title":"Topical categorization of credible microblog content","volume":"2","year":"2014","journal-title":"Int J Sci Res Develop"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-319-14379-8_4","article-title":"Social network derived credibility","author":"briscoe","year":"2015","journal-title":"Recommendation and Search in Social Networks"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963250"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2017.2719705"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2656635"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1954","DOI":"10.1007\/978-1-4614-6170-8_294","article-title":"Spam detection, E-mail\/social network","author":"dong","year":"2014","journal-title":"Encyclopedia of Social Network Analysis and Mining"},{"key":"ref13","article-title":"Analysing the Twitter social graph: Whom can we trust?","author":"morozov","year":"2014"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-642-23644-0_17","article-title":"Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers","author":"yang","year":"2011","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675280"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415780"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380746"},{"key":"ref82","article-title":"Designing and evaluating techniques to mitigate misinformation spread on microblogging Web services","author":"gupta","year":"2015"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/2441955.2441962"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415780"},{"key":"ref81","first-page":"1","article-title":"Finding relevant sources in Twitter based on content and social structure","author":"canini","year":"2010","journal-title":"Proc NIPS Workshop"},{"key":"ref18","first-page":"53","article-title":"A model for recalibrating credibility in different contexts and languages&#x2014;A Twitter case study","volume":"4","author":"almansour","year":"2014","journal-title":"Int J Dig Inf Wirel Comm"},{"key":"ref84","first-page":"103","article-title":"An ACT-R model of credibility judgment of micro-blogging Web pages","volume":"103","author":"liao","year":"2012","journal-title":"Proc Int Conf Cogn Model"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488476"},{"key":"ref19","article-title":"A survey on analyzing and measuring trustworthiness of user-generated content on Twitter during high-impact events","author":"joshi","year":"2013"},{"key":"ref83","first-page":"258","article-title":"CREDBANK: A large-scale social media corpus with associated credibility annotations","author":"mitra","year":"2015","journal-title":"Proc 9th Int AAAI Conf Web Social Media"},{"key":"ref114","first-page":"1239","article-title":"Tweet ranking based on heterogeneous networks","author":"huang","year":"2012","journal-title":"Proc 24th Int Conf Comput Ling"},{"key":"ref113","first-page":"1","article-title":"On Bayesian interpretation of fact-finding in information networks","author":"wang","year":"2011","journal-title":"Proc 14th Int Conf Inf Fusion (FUSION)"},{"key":"ref116","first-page":"1","article-title":"Automating military intelligence confidence assessments for Twitter messages","author":"ulicny","year":"2012","journal-title":"Proc 6th Annual Network Science Workshop"},{"key":"ref80","first-page":"5","article-title":"Twitter and the underground market","author":"micheli","year":"2013","journal-title":"11th Nexa Lunch Seminar"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2331801.2331805"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2013.6529542"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s00146-014-0549-4","article-title":"Social media analytics: A survey of techniques, tools and platforms","volume":"30","author":"batrinca","year":"2015","journal-title":"AI Soc"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45652-1_40"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2013.148"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2015.7257176"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350203"},{"key":"ref86","author":"murphy","year":"2012","journal-title":"Machine Learning A Probabilistic Perspective"},{"key":"ref87","first-page":"1405.5490","article-title":"TweetCred: A real-time Web-based system for assessing credibility of content on Twitter","author":"gupta","year":"2014","journal-title":"Proc 6th Int Conf Social Inf (SocInfo)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2808797.2809347"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08572695.pdf?arnumber=8572695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T11:28:36Z","timestamp":1775302116000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8572695\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":185,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2886314","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}