{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T21:14:58Z","timestamp":1775337298710,"version":"3.50.1"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272025"],"award-info":[{"award-number":["62272025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2021"],"award-info":[{"award-number":["U22B2021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372057"],"award-info":[{"award-number":["62372057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fund of the State Key Laboratory of Software Development Environment"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tkde.2024.3496701","type":"journal-article","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T18:46:23Z","timestamp":1731437183000},"page":"613-625","source":"Crossref","is-referenced-by-count":21,"title":["Early Detection of Multimodal Fake News via Reinforced Propagation Path Generation"],"prefix":"10.1109","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6981-3873","authenticated-orcid":false,"given":"Litian","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6662-4102","authenticated-orcid":false,"given":"Xiaoming","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0059-1381","authenticated-orcid":false,"given":"Ziyi","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2111-7385","authenticated-orcid":false,"given":"Xi","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3615-4859","authenticated-orcid":false,"given":"Senzhang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3491-5968","authenticated-orcid":false,"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Chaozhuo","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313552"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313741"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462871"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511968"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330935"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.acl-long.62"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3570478"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539277"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7329"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681087"},{"key":"ref12","article-title":"Leveraging multi-source weak social supervision for early detection of fake news","author":"Shu","year":"2020"},{"key":"ref13","first-page":"6680","article-title":"Social bot-aware graph neural network for early rumor detection","volume-title":"Proc. 29th Int. Conf. Comput. Linguistics","author":"Huang"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.475"},{"key":"ref15","article-title":"Exploiting user comments for early detection of fake news prior to users\u2019 commenting","author":"Nan","year":"2023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5393"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/335"},{"key":"ref18","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3626772.3657697"},{"key":"ref20","article-title":"Graph attention networks","author":"Veli\u010dkovi\u0107"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.168"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539324"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i15.29618"},{"key":"ref24","article-title":"Graph convolutional reinforcement learning","author":"Jiang"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00115009"},{"key":"ref26","volume-title":"Dynamic Programming","volume":"707","author":"Bellman","year":"2013"},{"key":"ref27","first-page":"1057","article-title":"Policy gradient method for reinforcement learning with function approximation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sutton"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i10.21422"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00062"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0062"},{"key":"ref31","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","author":"Devlin","year":"2018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219903"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132877"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462990"},{"key":"ref35","article-title":"Decoupled weight decay regularization","author":"Loshchilov","year":"2017"},{"key":"ref36","article-title":"Llama 2: Open foundation and fine-tuned chat models","author":"Touvron","year":"2023"},{"key":"ref37","article-title":"Assessing the effectiveness of GPT-3 in detecting false political statements: A case study on the liar dataset","author":"Buchholz","year":"2023"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488033"},{"key":"ref40","first-page":"3818","article-title":"Detecting rumors from microblogs with recurrent neural networks","volume-title":"Proc. 25th Int. Joint Conf. Artif. Intell.","author":"Ma"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2617078"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102715"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2579000"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-5316"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123454"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747280"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i10.7230"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47436-2_27"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.findings-acl.226"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/AIIoT58121.2023.10174450"},{"key":"ref51","article-title":"Harnessing the power of chatgpt in fake news: An in-depth exploration in generation, detection and explanation","author":"Huang","year":"2023"},{"key":"ref52","article-title":"Can llm-generated misinformation be detected?","author":"Chen","year":"2023"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.386"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW59549.2023.00025"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3373464.3373473"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113322"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1066"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380180"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501027"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p18-1184"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00180"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447588"},{"key":"ref63","article-title":"LOSS-GAT: Label propagation and one-class semi-supervised graph attention network for fake news detection","author":"Lakzaei","year":"2024"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741637"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2961675"},{"key":"ref66","article-title":"TI-CNN: Convolutional neural networks for fake news detection","author":"Yang","year":"2018"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67256-4_13"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3386253"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/69\/10837577\/10750410.pdf?arnumber=10750410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T21:13:14Z","timestamp":1736975594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10750410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":68,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3496701","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}