{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:23:10Z","timestamp":1772554990650,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3040604","type":"journal-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T21:21:44Z","timestamp":1606339304000},"page":"213154-213167","source":"Crossref","is-referenced-by-count":85,"title":["Unreliable Users Detection in Social Media: Deep Learning Techniques for Automatic Detection"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4953-1390","authenticated-orcid":false,"given":"Giuseppe","family":"Sansonetti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0263-531X","authenticated-orcid":false,"given":"Fabio","family":"Gasparetti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8687-9348","authenticated-orcid":false,"given":"Giuseppe","family":"D'aniello","sequence":"additional","affiliation":[]},{"given":"Alessandro","family":"Micarelli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Graph neural networks with continual learning for fake news detection from social media","author":"han","year":"2020","journal-title":"arXiv 2007 03316"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2693418"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1609\/icwsm.v14i1.7329","article-title":"Hierarchical propagation networks for fake news detection: Investigation and exploitation","author":"shu","year":"2020","journal-title":"Proc AAAI Int Conf Weblogs and Social Media (ICWSM)"},{"key":"ref32","first-page":"354","article-title":"Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks","author":"liu","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell (AAAI) 30th Innov Appl Artif Intell (IAAI) 8th AAAI Symp Educ Adv Artif Intell (EAAI)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"ref30","article-title":"Attention-based graph neural network for semi-supervised learning","author":"thekumparampil","year":"2018","journal-title":"arXiv 1803 03735"},{"key":"ref37","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"arXiv 1312 6199"},{"key":"ref36","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"arXiv 1412 6572"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3373464.3373473"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159677"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342958"},{"key":"ref27","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2017","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508241"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015644"},{"key":"ref1","first-page":"1","author":"shu","year":"2020","journal-title":"Mining Disinformation Fake News Concepts Methods Recent Advancements"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.91"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.14"},{"key":"ref24","article-title":"Graph neural networks: A review of methods and applications","author":"zhou","year":"2018","journal-title":"arXiv 1812 08434"},{"key":"ref23","first-page":"1","article-title":"Spectral networks and locally connected networks on graphs","author":"bruna","year":"2014","journal-title":"Proc Int Conf Learn Represent (ICLR)ICLR"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32233-5_54"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009982220290"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2010.5569327"},{"key":"ref52","first-page":"280","article-title":"Online human-bot interactions: Detection, estimation, and characterization","author":"varol","year":"2017","journal-title":"Proc 11th Int Conf Web Social Media"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806652"},{"key":"ref40","first-page":"4805","article-title":"Hierarchical graph representation learning with differentiable pooling","author":"ying","year":"2018","journal-title":"Proc 32nd Int Conf Neural Inf Process Syst"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889354"},{"key":"ref13","first-page":"171","article-title":"Syntactic stylometry for deception detection","volume":"2","author":"feng","year":"2012","journal-title":"Proc Annual Meeting of the Assoc Computational Linguistics"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2067"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2823465.2823467"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3003433"},{"key":"ref18","first-page":"2972","article-title":"News verification by exploiting conflicting social viewpoints in microblogs","author":"jin","year":"2016","journal-title":"Proc 13th AAAI Conf Artif Intell"},{"key":"ref19","article-title":"Some like it hoax: Automated fake news detection in social networks","volume":"abs 1704 7506","author":"tacchini","year":"2017","journal-title":"CoRR"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"ref3","article-title":"Fake news detection on social media using geometric deep learning","author":"monti","year":"2019","journal-title":"arXiv 1902 06673"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330935"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132877"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i11.7090"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3395046"},{"key":"ref49","author":"demuth","year":"2014","journal-title":"Neural Network Design"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.03.004"},{"key":"ref45","article-title":"False information on Web and social media: A survey","author":"kumar","year":"2018","journal-title":"arXiv 1804 08559"},{"key":"ref48","first-page":"1","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2015","journal-title":"Proc 3rd Int Conf Learn Represent (ICLR)"},{"key":"ref47","first-page":"1","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"Proc Int Conf Learn Represent (ICLR)ICLR"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"ref41","first-page":"6470","article-title":"Gradient episodic memory for continual learning","author":"lopez-paz","year":"2017","journal-title":"Proc 31st Int Conf Neural Inf Process Syst"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5393"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.48"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09269985.pdf?arnumber=9269985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T21:34:21Z","timestamp":1669757661000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9269985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3040604","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}