{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T03:59:33Z","timestamp":1772337573403,"version":"3.50.1"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"H2020 MEDINA","award":["952633"],"award-info":[{"award-number":["952633"]}]},{"name":"Italian Ministry of Education, University, and Research"},{"name":"Ministry of Science, Research and the Arts of the State of Baden-W&#x00FC;rttemberg"},{"name":"DFG Centre of Excellence 2117","award":["422037984"],"award-info":[{"award-number":["422037984"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Comput."],"published-print":{"date-parts":[[2022,3,1]]},"DOI":"10.1109\/mic.2021.3130380","type":"journal-article","created":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T20:13:54Z","timestamp":1637957634000},"page":"47-52","source":"Crossref","is-referenced-by-count":10,"title":["Adversarial Machine Learning for Protecting Against Online Manipulation"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0170-2445","authenticated-orcid":false,"given":"Stefano","family":"Cresci","sequence":"first","affiliation":[{"name":"IIT-CNR, Pisa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0591-877X","authenticated-orcid":false,"given":"Marinella","family":"Petrocchi","sequence":"additional","affiliation":[{"name":"IIT-CNR, Pisa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6935-0701","authenticated-orcid":false,"given":"Angelo","family":"Spognardi","sequence":"additional","affiliation":[{"name":"Sapienza Universit&#x00E0; di Roma, Rome, Italy"}]},{"given":"Stefano","family":"Tognazzi","sequence":"additional","affiliation":[{"name":"Konstanz University, Konstanz, Germany"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011286"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3363818"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330935"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23138"},{"key":"ref13","first-page":"649","article-title":"Character-level convolutional networks for text classification","author":"zhang","year":"2015","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00037"},{"key":"ref15","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"radford","year":"2019","journal-title":"Open"},{"key":"ref16","article-title":"Topic-preserving synthetic news generation: An adversarial deep reinforcement learning approach","author":"mosallanezhad","year":"2020"},{"key":"ref17","first-page":"4826","article-title":"A survey on computational propaganda detection","author":"san","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref18","first-page":"9054","article-title":"Defending against neural fake news","author":"zellers","year":"2019","journal-title":"Neural Inf Process Syst"},{"key":"ref19","first-page":"1877","article-title":"Language models are few-shot learners","author":"brown","year":"2020","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1089\/big.2017.0044"},{"key":"ref4","article-title":"Adversarial patch","author":"brown","year":"0","journal-title":"Proc Neural Inf Process Syst Workshops"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403364"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/9781118841570.iejs0128"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2975630"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1126\/science.aao2998","article-title":"The science of fake news","volume":"359","author":"lazer","year":"2018","journal-title":"Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3409116"},{"key":"ref7","author":"gangware","year":"2019","journal-title":"Weapons of Mass Distraction Foreign State-Sponsored Disinformation in the Digital Age"},{"key":"ref2","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"0","journal-title":"Proc 3rd Int Conf Learn Representations"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3395046"},{"key":"ref1","author":"mitchell","year":"1997","journal-title":"Machine Learning"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2970615"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2267732"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3055135"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2018.10.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2934193"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467390"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326030"}],"container-title":["IEEE Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4236\/9775543\/09627787.pdf?arnumber=9627787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T00:38:29Z","timestamp":1670373509000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9627787\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,1]]},"references-count":30,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mic.2021.3130380","relation":{},"ISSN":["1089-7801","1941-0131"],"issn-type":[{"value":"1089-7801","type":"print"},{"value":"1941-0131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,1]]}}}