{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:35:58Z","timestamp":1776681358981,"version":"3.51.2"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2017YFB0202201"],"award-info":[{"award-number":["2017YFB0202201"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1711261"],"award-info":[{"award-number":["U1711261"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976051"],"award-info":[{"award-number":["61976051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Major Project of Basic and Applied Basic Research","award":["2019B030302002"],"award-info":[{"award-number":["2019B030302002"]}]},{"name":"Basic Research Project of Shenzhen","award":["JCYJ20180306174743727"],"award-info":[{"award-number":["JCYJ20180306174743727"]}]},{"name":"Basic Research Project of Shenzhen","award":["JCYJ20190806143405318"],"award-info":[{"award-number":["JCYJ20190806143405318"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tkde.2021.3054993","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T21:37:50Z","timestamp":1611869870000},"page":"5154-5165","source":"Crossref","is-referenced-by-count":128,"title":["An Integrated Multi-Task Model for Fake News Detection"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1012-5301","authenticated-orcid":false,"given":"Qing","family":"Liao","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology(Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4470-9364","authenticated-orcid":false,"given":"Heyan","family":"Chai","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology(Shenzhen), Shenzhen, China"}]},{"given":"Hao","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology(Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5201-3802","authenticated-orcid":false,"given":"Xiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology(Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3512-0649","authenticated-orcid":false,"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology(Shenzhen), Shenzhen, China"}]},{"given":"Wen","family":"Xia","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Harbin Institute of Technology(Shenzhen), Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6992-8611","authenticated-orcid":false,"given":"Ye","family":"Ding","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Dongguan University of Technology, Dongguan, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Data on Facebooks fake news problem","author":"Shavit","year":"2016","journal-title":"Jumpshot"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"ref3","article-title":"Google engineer beaten to death, 3 critical in indian lynch mob attack fueled by \u2019kidnapping\u2019 rumor","author":"Verma","year":"2018","journal-title":"Thomson Reuters"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3055153"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-018-09280-3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.273"},{"key":"ref7","first-page":"3391","article-title":"Automatic detection of fake news","volume-title":"Proc. 27th Int. Conf. Comput. Linguistics","author":"P\u00e9rez-Rosas"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"ref9","first-page":"171","article-title":"Syntactic stylometry for deception detection","volume-title":"Proc. 50th Annu. Meeting Assoc. Comput. Linguistics","author":"Feng"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350203"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"ref12","first-page":"3818","article-title":"Detecting rumors from microblogs with recurrent neural networks","volume-title":"Proc. 25th Int. Joint Conf. Artif. Intell.","author":"Ma"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123454"},{"key":"ref14","first-page":"1546","article-title":"Multi-source multi-class fake news detection","volume-title":"Proc. 27th Int. Conf. Comput. Linguistics","author":"Karimi"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2067"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219903"},{"key":"ref17","article-title":"Fake news detection with deep diffusive network model","author":"Zhang","year":"2018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2879108"},{"key":"ref19","article-title":"News use across social media platforms 2016","author":"Gottfried","year":"2016","journal-title":"Journalism"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/1369118x.2018.1474241"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964869"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.14"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2823465.2823467"},{"key":"ref24","article-title":"Some like it hoax: Automated fake news detection in social networks","author":"Tacchini","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831542"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.61"},{"key":"ref27","first-page":"1589","article-title":"Rumor has it: Identifying misinformation in microblogs","volume-title":"Proc. Conf. Empir. Methods Natural Lang. Process.","author":"Qazvinian"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40991-2_16"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w16-0802"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2015.145052010082"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806651"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0150989"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70096-0_59"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188729"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330935"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015644"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132877"},{"key":"ref39","first-page":"1391","article-title":"Fake news detection using deep Markov random fields","volume-title":"Proc. North Amer. Chapter Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Nguyen"},{"key":"ref40","first-page":"252","article-title":"Fake news detection through multi-perspective speaker profiles","volume-title":"Proc. 8th Int. Joint Conf. Natural Lang. Process.","author":"Long"},{"key":"ref41","article-title":"A study on deep learning for fake news detection","author":"Pham","year":"2018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SPAC.2017.8304254"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.06.084"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.52"},{"key":"ref45","first-page":"2873","article-title":"Recurrent neural network for text classification with multi-task learning","volume-title":"Proc. 25th Int. Joint Conf. Artif. Intell.","author":"Liu"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2895608"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref48","article-title":"Semi-supervised classification with graph convolutional networks","author":"Kipf"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.12"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/n16-1174"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1023\/A:I0I0933404324"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1041"},{"key":"ref55","first-page":"2321","article-title":"Joint embedding of words and labels for text classification","volume-title":"Proc. 56th Annu. Meeting Assoc. Comput. Linguistics","author":"Henao"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017370"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1351"},{"key":"ref58","article-title":"Rick scott says his budget proposal has \u201cthe highest state funding level in history\u201d for education","author":"Scott","year":"2013","journal-title":"PolitiFact"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/9913316\/09339883.pdf?arnumber=9339883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:43:12Z","timestamp":1704840192000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9339883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":58,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2021.3054993","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}