{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T02:17:28Z","timestamp":1776046648731,"version":"3.50.1"},"reference-count":133,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T00:00:00Z","timestamp":1555027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC Grant","award":["Nos.61772039, 91646202 and 61472006"],"award-info":[{"award-number":["Nos.61772039, 91646202 and 61472006"]}]},{"name":"NSF Research Grant","award":["IIS-1619458 and IIS-1254206"],"award-info":[{"award-number":["IIS-1619458 and IIS-1254206"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2019,5,31]]},"abstract":"<jats:p>The proliferation of fake news on social media has opened up new directions of research for timely identification and containment of fake news and mitigation of its widespread impact on public opinion. While much of the earlier research was focused on identification of fake news based on its contents or by exploiting users\u2019 engagements with the news on social media, there has been a rising interest in proactive intervention strategies to counter the spread of misinformation and its impact on society. In this survey, we describe the modern-day problem of fake news and, in particular, highlight the technical challenges associated with it. We discuss existing methods and techniques applicable to both identification and mitigation, with a focus on the significant advances in each method and their advantages and limitations. In addition, research has often been limited by the quality of existing datasets and their specific application contexts. To alleviate this problem, we comprehensively compile and summarize characteristic features of available datasets. Furthermore, we outline new directions of research to facilitate future development of effective and interdisciplinary solutions.<\/jats:p>","DOI":"10.1145\/3305260","type":"journal-article","created":{"date-parts":[[2019,4,15]],"date-time":"2019-04-15T12:07:04Z","timestamp":1555330024000},"page":"1-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":421,"title":["Combating Fake News"],"prefix":"10.1145","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6825-5876","authenticated-orcid":false,"given":"Karishma","family":"Sharma","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]},{"given":"Feng","family":"Qian","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]},{"given":"He","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]},{"given":"Natali","family":"Ruchansky","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]},{"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, California, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/08934210802381862"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 1323--1331","author":"Amoruso Marco","year":"2017"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12290-016-0395-5"},{"key":"e_1_2_1_5_1","first-page":"12","article-title":"Many Americans believe fake news is sowing confusion","volume":"15","author":"Barthel Michael","year":"2016","journal-title":"Pew Res. Center"},{"key":"e_1_2_1_6_1","volume-title":"Social bots distort the 2016 US presidential election online discussion. First Monday 21, 11","author":"Bessi Alessandro","year":"2016"},{"key":"e_1_2_1_7_1","volume-title":"Longman Grammar of Spoken and Written English","author":"Biber Douglas"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics.","author":"Blunsom Phil","year":"2014"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2016.00243"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1087"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1996.tb00129.x"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jempfin.2011.03.003"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04503-6_4"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2823465.2823467"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_2_1_19_1","unstructured":"Sahil Chopra Saachi Jain and John Merriman Sholar. 2017. Towards Automatic Identification of Fake News: Headline-Article Stance Detection with LSTM Attention Models. Retrieved on 2019 from https:\/\/johnsholar.com\/pdf\/CS224NPaper.pdf. Sahil Chopra Saachi Jain and John Merriman Sholar. 2017. Towards Automatic Identification of Fake News: Headline-Article Stance Detection with LSTM Attention Models. Retrieved on 2019 from https:\/\/johnsholar.com\/pdf\/CS224NPaper.pdf."},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of thePacific Asia Conference on Information Systems.","author":"Chua Alton Y. K.","year":"2016"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Michael Collins and Nigel Duffy. 2002. Convolution kernels for natural language. In Advances in Neural Information Processing Systems. 625--632. Michael Collins and Nigel Duffy. 2002. Convolution kernels for natural language. In Advances in Neural Information Processing Systems. 625--632.","DOI":"10.7551\/mitpress\/1120.003.0085"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1086\/692298"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.09.003"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1517441113"},{"key":"e_1_2_1_26_1","first-page":"77","article-title":"A validity assessment of written statements from suspects in criminal investigations using the scan technique. Police Stud","volume":"17","author":"Driscoll Lawrence N.","year":"1994","journal-title":"Int\u2019l Rev. Police Dev."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning","volume":"70","author":"Farajtabar Mehrdad","year":"2017"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2390665.2390708"},{"key":"e_1_2_1_29_1","volume-title":"John Woodrow Cox, and Peter Hermann","author":"Fisher Marc","year":"2016"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052706"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media (ICWSM\u201914)","author":"Friggeri Adrien","year":"2014"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.001"},{"key":"e_1_2_1_33_1","unstructured":"Kiran Garimella Aristides Gionis Nikos Parotsidis and Nikolaj Tatti. 2017. Balancing information exposure in social networks. In Advances in Neural Information Processing Systems. 4663--4671. Kiran Garimella Aristides Gionis Nikos Parotsidis and Nikolaj Tatti. 2017. Balancing information exposure in social networks. In Advances in Neural Information Processing Systems. 4663--4671."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186130"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201100"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13734-6_16"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488033"},{"key":"e_1_2_1_38_1","unstructured":"L. Harriss and K. Raymer. 2017. Online Information and Fake News. L. Harriss and K. Raymer. 2017. Online Information and Fake News."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"},{"key":"e_1_2_1_40_1","first-page":"5","article-title":"Tweets and truth: Journalism as a discipline of collaborative verification","volume":"6","author":"Hermida Alfred","year":"2012","journal-title":"J. Pract."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1038\/540009a"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_2_1_43_1","volume-title":"Horne and Sibel Adali","author":"Benjamin","year":"2017"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501027"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/972764.972768"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.71"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159734"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI\u201909)","author":"Kimura Masahiro","year":"2009"},{"key":"e_1_2_1_51_1","first-page":"18","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. Association for Computational Linguistics, 3402--3413","author":"Kochkina Elena","year":"2018"},{"key":"e_1_2_1_52_1","first-page":"18","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. Association for Computational Linguistics, 3402--3413","author":"Kochkina Elena","year":"2018"},{"key":"e_1_2_1_53_1","volume-title":"Fake news: Evidence from financial markets. SSRN: 3237763","author":"Kogan Shimon","year":"2018"},{"key":"e_1_2_1_54_1","volume-title":"False information on web and social media: A survey. arXiv preprint arXiv:1804.08559","author":"Kumar Srijan","year":"2018"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883085"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168344"},{"key":"e_1_2_1_57_1","first-page":"799","article-title":"Fake Web Addresses and Hyperlinks","volume":"8","author":"Lake John Michael","year":"2014","journal-title":"US Patent"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-679X.2012.00450.x"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the 31st International Conference on Machine Learning (ICML-14)","author":"Le Quoc","year":"2014"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI\u201916)","author":"Ma Jing","year":"2016"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806607"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1066"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188729"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1184"},{"key":"e_1_2_1_66_1","volume-title":"\u201cpizzagate","author":"Metaxas Panagiotis","year":"2019"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.5555\/1667583.1667679"},{"key":"e_1_2_1_68_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145274"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/11871842_32"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806537"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0093965"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.016128"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167203029005010"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380746"},{"key":"e_1_2_1_76_1","volume-title":"Proceedings of the Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL HLT). 497--501","author":"Ott Myle"},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1. Association for Computational Linguistics, 309--319","author":"Ott Myle"},{"key":"e_1_2_1_78_1","volume-title":"The next step: Social media and the evolution of journalism. Honors Theses 53","author":"Paine Emory"},{"key":"e_1_2_1_79_1","volume-title":"Fake news propagation and detection: A sequential model. SSRN:3028354","author":"Papanastasiou Yiangos","year":"2017"},{"key":"e_1_2_1_80_1","first-page":"71","article-title":"Linguistic inquiry and word count","volume":"2001","author":"Pennebaker James W.","year":"2001","journal-title":"LIWC"},{"key":"e_1_2_1_81_1","volume-title":"Rand","author":"Pennycook Gordon","year":"2018"},{"key":"e_1_2_1_82_1","volume-title":"Proceedings of the 27th International Conference on Computational Linguistics. Association for Computational Linguistics","author":"P\u00e9rez-Rosas Ver\u00f3nica","year":"2018"},{"key":"e_1_2_1_83_1","volume-title":"Social media usage","author":"Perrin Andrew","year":"2015"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3186967"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3055133"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01498980"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1022"},{"key":"e_1_2_1_88_1","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 1589--1599","author":"Qazvinian Vahed","year":"2011"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.5555\/3304222.3304302"},{"key":"e_1_2_1_90_1","volume-title":"Sunstein","author":"Quattrociocchi Walter","year":"2016"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1317"},{"key":"e_1_2_1_92_1","first-page":"295","article-title":"Grammatical word class variation within the British National Corpus sampler","volume":"36","author":"Rayson Paul","year":"2001","journal-title":"Lang. Comput."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intell.2017.10.005"},{"key":"e_1_2_1_94_1","volume-title":"Risk Res","author":"Roozenbeek Jon","year":"2018"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-0802"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132877"},{"key":"e_1_2_1_97_1","first-page":"1","article-title":"Learning representations by back-propagating errors","volume":"5","author":"Rumelhart David E.","year":"1988","journal-title":"Cogn. Model."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.5555\/1339264.1339715"},{"key":"e_1_2_1_99_1","volume-title":"The LSI course on scientific content analysis (SCAN). Laboratory for Scientific Interrogation","author":"Sapir Avinoam"},{"key":"e_1_2_1_100_1","volume-title":"FakeNewsNet: A data repository with news content, social context and dynamic information for studying fake news on social media. arXiv preprint arXiv:1809.01286","author":"Shu Kai","year":"2018"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"e_1_2_1_102_1","volume-title":"damn lies and viral content","author":"Silverman Craig"},{"key":"e_1_2_1_103_1","volume-title":"Hyperpartisan Facebook","author":"Silverman Craig","year":"2019"},{"key":"e_1_2_1_104_1","volume-title":"Social media use","author":"Smith Aaron","year":"2018"},{"key":"e_1_2_1_105_1","volume-title":"Proceedings of the 2012 Joint Conference on Empirical Methods In Natural Language Processing and Computational Natural Language Learning. Association for Computational Linguistics, 1201--1211","author":"Socher Richard"},{"key":"e_1_2_1_106_1","volume-title":"Proceedings of the 28th International Conference on Machine Learning (ICML\u201911)","author":"Socher Richard"},{"key":"e_1_2_1_107_1","volume-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing. 1631--1642","author":"Socher Richard","year":"2013"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.183"},{"key":"e_1_2_1_109_1","volume-title":"Proceedings of the Second Workshop on Data Science for Social Good. CEUR Workshop Proceedings","volume":"1960","author":"Tacchini Eugenio","year":"2017"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0121443"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1074"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188722"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1464-0597.1984.tb01416.x"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2076"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-2508"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188728"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2102"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2067"},{"key":"e_1_2_1_119_1","unstructured":"Claire Wardle. 2017. Fake news. It's complicated. Retrieved on 2019 from https:\/\/firstdraftnews.org\/fake-news-complicated\/. Claire Wardle. 2017. Fake news. It's complicated. Retrieved on 2019 from https:\/\/firstdraftnews.org\/fake-news-complicated\/."},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the 2015 IEEE 31st International Conference on Data Engineering (ICDE\u201915)","author":"Wu Ke"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159677"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_2_1_123_1","volume-title":"Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers)","volume":"2","author":"He Xiaodong","year":"2014"},{"key":"e_1_2_1_124_1","unstructured":"YouGov. 2017. C4 study reveals only 4% surveyed can identify true or fake news. Retrieved from http:\/\/www.channel4.com\/info\/press\/news\/c4-study-reveals-only-4- surveyed-can-identify-true-or-fake-news. YouGov. 2017. C4 study reveals only 4% surveyed can identify true or fake news. Retrieved from http:\/\/www.channel4.com\/info\/press\/news\/c4-study-reveals-only-4- surveyed-can-identify-true-or-fake-news."},{"key":"e_1_2_1_125_1","volume-title":"Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 211--219","author":"Yu Sixie","year":"2018"},{"key":"e_1_2_1_126_1","volume-title":"The web of false information: Rumors, fake news, hoaxes, clickbait, and various other shenanigans. arXiv preprint arXiv:1804.03461","author":"Zannettou Savvas","year":"2018"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.07.013"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741637"},{"key":"e_1_2_1_129_1","unstructured":"Ke Zhou Hongyuan Zha and Le Song. 2013. Learning social infectivity in sparse low-rank networks using multi-dimensional hawkes processes. In Artificial Intelligence and Statistics. 641--649. Ke Zhou Hongyuan Zha and Le Song. 2013. Learning social infectivity in sparse low-rank networks using multi-dimensional hawkes processes. In Artificial Intelligence and Statistics. 641--649."},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000011944.62889.6f"},{"key":"e_1_2_1_131_1","unstructured":"Melissa Zimdars. 2016. False Misleading Clickbait-Y and Satirical `News' Sources. Retrieved 2019 from https:\/\/21stcenturywire.com\/wpcontent\/uploads\/2017\/02\/2017-DR-ZIMDARS-False-Misleading-Clickbait-y-and-Satirical-%E2%80%9CNews%E2%80%9D-Sources-Google-Docs.pdf. Melissa Zimdars. 2016. False Misleading Clickbait-Y and Satirical `News' Sources. Retrieved 2019 from https:\/\/21stcenturywire.com\/wpcontent\/uploads\/2017\/02\/2017-DR-ZIMDARS-False-Misleading-Clickbait-y-and-Satirical-%E2%80%9CNews%E2%80%9D-Sources-Google-Docs.pdf."},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161603"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0150989"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3305260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3305260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:58:09Z","timestamp":1750208289000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3305260"}},"subtitle":["A Survey on Identification and Mitigation Techniques"],"short-title":[],"issued":{"date-parts":[[2019,4,12]]},"references-count":133,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,5,31]]}},"alternative-id":["10.1145\/3305260"],"URL":"https:\/\/doi.org\/10.1145\/3305260","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,12]]},"assertion":[{"value":"2018-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-04-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}