{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:40:58Z","timestamp":1759333258099,"version":"3.28.0"},"reference-count":72,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/ijcnn.2019.8852080","type":"proceedings-article","created":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T23:44:32Z","timestamp":1569887072000},"page":"1-10","source":"Crossref","is-referenced-by-count":5,"title":["Social Network Polluting Contents Detection through Deep Learning Techniques"],"prefix":"10.1109","author":[{"given":"Fabio","family":"Martinelli","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Mercaldo","sequence":"additional","affiliation":[]},{"given":"Antonella","family":"Santone","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019793"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2017.8015464"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2016.67"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2793"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2010.116"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/RoboMech.2016.7813162"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2018.01.001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2018.8361330"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934984"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0613-y"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2855-x"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.193"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1561\/2000000039","article-title":"Deep learning: methods and applications","volume":"7","author":"deng","year":"2014","journal-title":"Foundations and Trends\ufffd in Signal Processing"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.04.008"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.12.050"},{"key":"ref65","first-page":"2177","article-title":"Neural word embedding as implicit matrix factorization","author":"levy","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.64"},{"key":"ref67","first-page":"185","article-title":"Seven months with the devils: A long-term study of content polluters on twitter","author":"lee","year":"2011","journal-title":"ICWSM"},{"key":"ref68","first-page":"26","article-title":"Infer gene regulatory networks from time series data with probabilistic model checking","author":"ruvo","year":"2015"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymeth.2014.06.005"},{"year":"0","key":"ref2","article-title":"Reuters institute digital news report 2017"},{"year":"0","key":"ref1","article-title":"Analysis by country"},{"key":"ref20","article-title":"Online human-bot interactions: Detection, estimation, and characterization","author":"varol","year":"2017","journal-title":"arXiv preprint arXiv 1703 04529"},{"year":"0","key":"ref22","article-title":"Social bots distort the 2016 u.s. presidential election online discussion"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3386\/w24462"},{"year":"0","key":"ref23","article-title":"China kills ai chatbots after they start praising us, criticising communists"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2834344"},{"year":"0","key":"ref25","article-title":"Bots amplify the spread of fake news, and harm economies, new research shows"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068840"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187846"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.216"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2014.931487"},{"key":"ref57","first-page":"744","article-title":"Mobile mal-ware detection in the real world","author":"mercaldo","year":"2016","journal-title":"Software Engineering Companion (ICSE-C) IEEE\/ACM International Conference on"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5220\/0005809205420547"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/319382.319388"},{"key":"ref54","article-title":"Efficient estimation of word representations in vector space","author":"mikolov","year":"2013","journal-title":"arXiv preprint arXiv 1301 3781"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767780"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1146"},{"key":"ref10","article-title":"A model of positive and negative learning: Learning demands and resources, learning engagement, critical thinking, and face news detection","author":"dormann","year":"2018","journal-title":"Positive learning in the age of information (PLATO) A blessing or a curse"},{"year":"0","key":"ref11","article-title":"Buzzfeed"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"year":"0","key":"ref12","article-title":"Take the buzzfeed quiz and test your fake news detecting skills!"},{"year":"0","key":"ref13","article-title":"The real consequences of fake news"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159677"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191610"},{"year":"0","key":"ref16","article-title":"socialbot"},{"year":"0","key":"ref17","article-title":"Social media bots offer phony friends and real profit"},{"key":"ref18","article-title":"The spread of low-credibility content by social bots","author":"shao","year":"2017","journal-title":"arXiv preprint arXiv 1707 07816"},{"key":"ref19","first-page":"297","article-title":"Detecting and tracking political abuse in social media","volume":"11","author":"ratkiewicz","year":"2011","journal-title":"ICWSM"},{"year":"0","key":"ref4","article-title":"French social media awash with fake news stories from sources exposed to russian influence ahead of presidential election"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"year":"0","key":"ref6","article-title":"War without blood"},{"year":"0","key":"ref5","article-title":"Movimento cinque stelle primo in europa a diffondere notizie false e propaganda russa"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3093397"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8013-5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835522"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718491"},{"key":"ref48","first-page":"12","article-title":"Detecting spammers on twitter","volume":"6","author":"benevenuto","year":"2010","journal-title":"Collaboration Electronic Messaging Anti-Abuse and Spam Conference (CEAS)"},{"key":"ref47","first-page":"87","article-title":"Using language modeling for spam detection in social reference manager websites","author":"bogers","year":"2009","journal-title":"Proc 9th Dutch-Belgian Information Retrieval Workshop (DIR 2009)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.28"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134055"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17616-6_22"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572046"}],"event":{"name":"2019 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2019,7,14]]},"location":"Budapest, Hungary","end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8840768\/8851681\/08852080.pdf?arnumber=8852080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:54:56Z","timestamp":1658080496000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8852080\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2019.8852080","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}