{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T08:04:35Z","timestamp":1769069075467,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/iccsce58721.2023.10237152","type":"proceedings-article","created":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T13:22:48Z","timestamp":1694006568000},"page":"297-302","source":"Crossref","is-referenced-by-count":12,"title":["Problem Understanding of Fake News Detection from a Data Mining Perspective"],"prefix":"10.1109","author":[{"given":"Hui Na","family":"Chua","sequence":"first","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Qaisar","family":"Khan","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Muhammed Basheer","family":"Jasser","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Richard T. K","family":"Wong","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.20901\/ms.10.19.2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372834"},{"key":"ref12","article-title":"Explaining credibility in news articles using cross-referencing","author":"bountouridis","year":"2018","journal-title":"SIGIR workshop on ExplainAble Recommendation and Search (EARS)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-7138-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AINS47559.2019.8968706"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1201\/b11430"},{"key":"ref20","first-page":"118121","article-title":"Detecting Fake News on Social Media: A Data Mining Perspective","volume":"8","author":"ma","year":"2020","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.499"},{"key":"ref22","author":"raschka","year":"2017","journal-title":"Machine Learning in Python"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2019.3478"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-018-07761-2"},{"key":"ref2","first-page":"22","article-title":"Fake News Detection on Social Media: A Data Mining Perspective","volume":"21","author":"shu","year":"2019","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"ref1","first-page":"102025","article-title":"A Survey on Fake News Detection: Fundamental Questions and Challenges","volume":"57","author":"zeng","year":"2020","journal-title":"Information Processing & Management"},{"key":"ref17","article-title":"A stylometric inquiry into hyperpartisan and fake news","author":"potthast","year":"2017","journal-title":"arXiv preprint arXiv 1702 05464"},{"key":"ref16","author":"ma","year":"0","journal-title":"Detecting Rumors from Microblogs with Recurrent Neural Networks"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"ref18","first-page":"1","article-title":"Fake News Detection via Multimodal Information: A Survey","volume":"11","author":"li","year":"2020","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2017.1360143"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IICAIET51634.2021.9573878"},{"key":"ref9","first-page":"113399","article-title":"Automated Detection of Fake News on Social Media Platforms: A Deep Learning Approach","volume":"138","author":"zeng","year":"2020","journal-title":"Decision Support Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5120-5_54"},{"key":"ref3","first-page":"68","article-title":"A survey of fake news: Fundamental theories, detection methods, and opportunities","volume":"30","author":"fayazi","year":"2019","journal-title":"Journal of Database Management"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"ref5","article-title":"Combating fake news: an agenda for research and action","author":"lazer","year":"2017","journal-title":"Filippo Menczer"}],"event":{"name":"2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)","location":"Penang, Malaysia","start":{"date-parts":[[2023,8,25]]},"end":{"date-parts":[[2023,8,26]]}},"container-title":["2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10237087\/10237006\/10237152.pdf?arnumber=10237152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T14:01:26Z","timestamp":1695650486000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10237152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/iccsce58721.2023.10237152","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}