{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:01:32Z","timestamp":1768737692953,"version":"3.49.0"},"reference-count":109,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/100007787","name":"National Research Centre","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1109\/sp46215.2023.10179392","type":"proceedings-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T17:18:15Z","timestamp":1689959895000},"page":"311-326","source":"Crossref","is-referenced-by-count":6,"title":["Lambretta: Learning to Rank for Twitter Soft Moderation"],"prefix":"10.1109","author":[{"given":"Pujan","family":"Paudel","sequence":"first","affiliation":[{"name":"Boston University"}]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"Binghamton University"}]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"Savvas","family":"Zannettou","sequence":"additional","affiliation":[{"name":"Delft University of Technology"}]},{"given":"Gianluca","family":"Stringhini","sequence":"additional","affiliation":[{"name":"Boston University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18113"},{"key":"ref2","article-title":"Twitter moves to target fake videos and photos","author":"Alba","year":"2020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-009-9117-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S17-2126"},{"key":"ref5","article-title":"Twitter to label all State-Affiliated Russia media","author":"Benson","year":"2022"},{"key":"ref6","article-title":"Publishing our internal enforcement guidelines and expanding our appeals process","author":"Bickert","year":"2018"},{"key":"ref7","article-title":"Were Facebook and Twitter consistent in labeling misleading posts during the 2020 election?","author":"Bradshaw","year":"2022"},{"issue":"23-581","key":"ref8","article-title":"From ranknet to lambdarank to lambdamart: An overview","volume":"11","author":"Burges","year":"2010","journal-title":"Learning"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2017.00040"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76941-7_80"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273513"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3359276"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106478"},{"key":"ref14","article-title":"Neural network architecture for credibility assessment of textual claims","author":"Choudhary","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866310"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0128193"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488420"},{"key":"ref18","article-title":"Neural abstractive text summarization and fake news detection","author":"Esmaeilzadeh","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21236\/ada538482"},{"issue":"1","key":"ref20","article-title":"Participant","volume":"4","author":"Fiesler","year":"2018","journal-title":"perceptions of Twitter research ethics. Social Media+ Society"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.14991"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS48265.2020.9120902"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3372923.3404783"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w18-2501"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818776611"},{"key":"ref26","article-title":"Youtube community guidelines enforcement in Google\u2019s transparency report for 2018","year":"2018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866311"},{"key":"ref28","article-title":"KeyBERT: Minimal keyword extraction with BERT","author":"Grootendorst","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36687-2_36"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775250"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098131"},{"key":"ref32","article-title":"Detecting credential spearphishing in enterprise settings","volume-title":"USENIX Security Symposium","author":"Ho"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.11117\/rdp.v18i99.6057"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3338243"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517505"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572113"},{"key":"ref37","article-title":"Adapting security warnings to counter online disinformation","volume-title":"USENIX Security Symposium","author":"Kaiser"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2508063"},{"key":"ref39","article-title":"The new governors: The people, rules, and processes governing online speech","author":"Klonick","year":"2017","journal-title":"Harvard Law Review"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3412869"},{"key":"ref41","article-title":"Fact check now available in Google search and news around the world","author":"Kosslyn","year":"2017"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1080\/10584609.2019.1686094"},{"key":"ref43","article-title":"Twitter is now flagging the use of \u2019oxygen\u2019 and \u2019frequency\u2019 in the same tweet, prompting new meme","author":"Lange","year":"2020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btt474"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2093346.2093356"},{"issue":"4","key":"ref46","article-title":"Keyword extraction from news corpus using modified TF-IDF","volume":"14","author":"Lee","year":"2009","journal-title":"The Journal of Society for e-Business Studies"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"ref48","article-title":"ClaimFinder: A Framework for Identifying Claims in Microblogs","author":"Lim","year":"2016","journal-title":"# Microposts"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v17i1.22168"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1561\/1500000016"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.48"},{"key":"ref52","article-title":"Twitter promises to fine-tune its 5G coronavirus labeling after unrelated tweets were flagged","author":"Lyons","year":"2020"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398691"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488463"},{"key":"ref55","article-title":"Gradient-based adversarial training on transformer networks for detecting check-worthy factual claims","author":"Meng","year":"2020"},{"key":"ref56","article-title":"Bing adds Fact Check label in SERP to support the ClaimReview markup","year":"2017"},{"key":"ref57","article-title":"Textrank: Bringing order into text","volume-title":"Proceedings of the 2004 conference on empirical methods in natural language processing","author":"Mihalcea"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23657"},{"key":"ref59","article-title":"How to Use AutoMod","author":"Moderation","year":"2021"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24637"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818773059"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412046"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.500-250.web-cmu-lti"},{"key":"ref64","article-title":"Programmatic gold: Targeted and scalable quality assurance in crowdsourcing","volume-title":"Workshops at the Twenty-Fifth AAAI conference on artificial intelligence","author":"Oleson"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1568234.1568246"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00671-6_39"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512126"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_1"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330677"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2019.3478"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1037\/xge0000465"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/533"},{"key":"ref73","article-title":"Introducing LETOR 4.0 datasets","author":"Qin","year":"2013"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-009-9123-y"},{"key":"ref75","article-title":"Using TF-IDF to determine word relevance in document queries","volume-title":"Proceedings of the first instructional conference on machine learning","author":"Ramos"},{"key":"ref76","article-title":"Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations","author":"Recabarren","year":"2022"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1561\/1500000019"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1002\/9780470689646.ch1"},{"key":"ref80","article-title":"Fake news on social media: The (in) effectiveness of warning messages","volume-title":"International Conference on Information Systems","author":"Ross"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833706"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3415178"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818821316"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890098"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0196087"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102577"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433485"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342927"},{"key":"ref89","article-title":"A first look at COVID-19 information and misinformation sharing on Twitter","author":"Singh","year":"2020"},{"key":"ref90","article-title":"Designing against misinformation","author":"Smith","year":"2017"},{"key":"ref91","article-title":"Mpnet: Masked and permuted pre-training for language understanding","volume":"33","author":"Song","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1081"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3359229"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2930479"},{"key":"ref95","article-title":"Learning to rank answers on large online QA collections","volume-title":"proceedings of ACL-08: HLT","author":"Surdeanu"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1162\/COLI_a_00051"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450024"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188722"},{"key":"ref99","article-title":"An update on our work around the 2020 US Elections","year":"2020"},{"key":"ref100","article-title":"The Twitter Rules","year":"2020"},{"key":"ref101","article-title":"Our approach to the 2022 US midterms","year":"2022"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.bionlp-1.15"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18110"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326016"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7343"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8257911"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00021"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00075"}],"event":{"name":"2023 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,5,21]]},"end":{"date-parts":[[2023,5,25]]}},"container-title":["2023 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10179215\/10179280\/10179392.pdf?arnumber=10179392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:15:25Z","timestamp":1721452525000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10179392\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5]]},"references-count":109,"URL":"https:\/\/doi.org\/10.1109\/sp46215.2023.10179392","relation":{},"subject":[],"published":{"date-parts":[[2023,5]]}}}