{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T16:51:45Z","timestamp":1767891105195,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T00:00:00Z","timestamp":1696204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,2]]},"DOI":"10.1109\/icset59111.2023.10295146","type":"proceedings-article","created":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:52:58Z","timestamp":1698691978000},"page":"313-318","source":"Crossref","is-referenced-by-count":5,"title":["Fake News Detection Using Social Media User Network and Engagement Features"],"prefix":"10.1109","author":[{"given":"Kelvin Keat Hung","family":"Phang","sequence":"first","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Hui Na","family":"Chua","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Muhammed Basheer","family":"Jasser","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]},{"given":"Richard T. K.","family":"Wong","sequence":"additional","affiliation":[{"name":"Sunway University,Department of Computing and Information Systems,Sunway City,Selangor,Malaysia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.03.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0062"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.145052010083"},{"key":"ref14","first-page":"10","article-title":"Fake news detection: a deep learning approach","volume":"1","author":"thota","year":"2018","journal-title":"SMU Data Science Review"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IICAIET55139.2022.9936814"},{"key":"ref10","author":"madre","year":"2021","journal-title":"Fake News Detection using News Content and User Engagement"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE58721.2023.10237152"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-04216-4_21"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1037\/a0030592"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-00878-9"},{"key":"ref19","author":"cialdini","year":"1993","journal-title":"Influence Science and Practice"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1002\/9781118548387","volume":"398","author":"hosmer","year":"2013","journal-title":"Applied Logistic Regression"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/app11188352"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1890\/07-0539.1"},{"key":"ref25","first-page":"3","article-title":"Supervised machine learning: A review of classification techniques","volume":"160","author":"kotsiantis","year":"2007","journal-title":"Emerging Artificial Intelligence Applications in Computer Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/009365098025006006"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IICAIET55139.2022.9936788"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/01461672012710001"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref27","article-title":"Lightgbm: A highly efficient gradient boosting decision tree","volume":"30","author":"ke","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref29","first-page":"41","article-title":"A comparison of event models for naive bayes text classification","volume":"752","author":"mccallum","year":"1998","journal-title":"AAAI-98 Workshop on Learning for Text Categorization"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/AINS47559.2019.8968706"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5120-5_54"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342927"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998213"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462990"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3373464.3373473"}],"event":{"name":"2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)","location":"Shah Alam, Malaysia","start":{"date-parts":[[2023,10,2]]},"end":{"date-parts":[[2023,10,2]]}},"container-title":["2023 IEEE 13th International Conference on System Engineering and Technology (ICSET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10294331\/10295068\/10295146.pdf?arnumber=10295146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:27:26Z","timestamp":1701113246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10295146\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,2]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icset59111.2023.10295146","relation":{},"subject":[],"published":{"date-parts":[[2023,10,2]]}}}