{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T17:05:38Z","timestamp":1772298338453,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,27]]},"DOI":"10.1145\/3341161.3342892","type":"proceedings-article","created":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T21:07:04Z","timestamp":1579122424000},"page":"105-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Neural language model based training data augmentation for weakly supervised early rumor detection"],"prefix":"10.1145","author":[{"given":"Sooji","family":"Han","sequence":"first","affiliation":[{"name":"The University of Sheffield, Sheffield, UK"}]},{"given":"Jie","family":"Gao","sequence":"additional","affiliation":[{"name":"The University of Sheffield, Sheffield, UK"}]},{"given":"Fabio","family":"Ciravegna","sequence":"additional","affiliation":[{"name":"The University of Sheffield, Sheffield, UK"}]}],"member":"320","published-online":{"date-parts":[[2020,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168344"},{"key":"e_1_3_2_1_2_1","volume-title":"Rumor detection on twitter with tree-structured recursive neural networks,\" in ACL","author":"Wong K.-F.","year":"2018","unstructured":"K.-F. Wong , W. Gao , and J. Ma , \" Rumor detection on twitter with tree-structured recursive neural networks,\" in ACL , 2018 . K.-F. Wong, W. Gao, and J. Ma, \"Rumor detection on twitter with tree-structured recursive neural networks,\" in ACL, 2018."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5132-9"},{"key":"e_1_3_2_1_4_1","first-page":"3402","volume-title":"All-in-one: Multi-task learning for rumour verification,\" in Proceedings of the 27th International Conference on Computational Linguistics","author":"Kochkina E.","year":"2018","unstructured":"E. Kochkina , M. Liakata , and A. Zubiaga , \" All-in-one: Multi-task learning for rumour verification,\" in Proceedings of the 27th International Conference on Computational Linguistics , 2018 , pp. 3402 -- 3413 . E. Kochkina, M. Liakata, and A. Zubiaga, \"All-in-one: Multi-task learning for rumour verification,\" in Proceedings of the 27th International Conference on Computational Linguistics, 2018, pp. 3402--3413."},{"key":"e_1_3_2_1_5_1","volume-title":"Learning reporting dynamics during breaking news for rumour detection in social media,\" CoRR","author":"Zubiaga A.","year":"2016","unstructured":"A. Zubiaga , M. Liakata , and R. Procter , \" Learning reporting dynamics during breaking news for rumour detection in social media,\" CoRR , 2016 . A. Zubiaga, M. Liakata, and R. Procter, \"Learning reporting dynamics during breaking news for rumour detection in social media,\" CoRR, 2016."},{"key":"e_1_3_2_1_6_1","first-page":"40","volume-title":"Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection,\" in Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"Chen T.","year":"2018","unstructured":"T. Chen , X. Li , H. Yin , and J. Zhang , \" Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection,\" in Pacific-Asia Conference on Knowledge Discovery and Data Mining . Springer , 2018 , pp. 40 -- 52 . T. Chen, X. Li, H. Yin, and J. Zhang, \"Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection,\" in Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 2018, pp. 40--52."},{"key":"e_1_3_2_1_7_1","first-page":"3818","volume-title":"IJCAI'16","author":"Ma J.","year":"2016","unstructured":"J. Ma , W. Gao , P. Mitra , S. Kwon , B. J. Jansen , K.-F. Wong , and M. Cha , \" Detecting rumors from microblogs with recurrent neural networks,\" in Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, ser . IJCAI'16 , 2016 , pp. 3818 -- 3824 . J. Ma, W. Gao, P. Mitra, S. Kwon, B. J. Jansen, K.-F. Wong, and M. Cha, \"Detecting rumors from microblogs with recurrent neural networks,\" in Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, ser. IJCAI'16, 2016, pp. 3818--3824."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfds.2017.05.001"},{"key":"e_1_3_2_1_9_1","first-page":"53","volume-title":"Stance classification in out-of-domain rumours: A case study around mental health disorders,\" in International Conference on Social Informatics","author":"Aker A.","year":"2017","unstructured":"A. Aker , A. Zubiaga , K. Bontcheva , A. Kolliakou , R. Procter , and M. Liakata , \" Stance classification in out-of-domain rumours: A case study around mental health disorders,\" in International Conference on Social Informatics . Springer , 2017 , pp. 53 -- 64 . A. Aker, A. Zubiaga, K. Bontcheva, A. Kolliakou, R. Procter, and M. Liakata, \"Stance classification in out-of-domain rumours: A case study around mental health disorders,\" in International Conference on Social Informatics. Springer, 2017, pp. 53--64."},{"key":"e_1_3_2_1_10_1","first-page":"407","volume-title":"Do rumors diffuse differently from non-rumors? a systematically empirical analysis in sina weibo for rumor identification,\" in Pacific-Asia Conference on Knowledge Discovery and Data Mining","author":"Liu Y.","year":"2017","unstructured":"Y. Liu , X. Jin , H. Shen , and X. Cheng , \" Do rumors diffuse differently from non-rumors? a systematically empirical analysis in sina weibo for rumor identification,\" in Pacific-Asia Conference on Knowledge Discovery and Data Mining . Springer , 2017 , pp. 407 -- 420 . Y. Liu, X. Jin, H. Shen, and X. Cheng, \"Do rumors diffuse differently from non-rumors? a systematically empirical analysis in sina weibo for rumor identification,\" in Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 2017, pp. 407--420."},{"key":"e_1_3_2_1_11_1","first-page":"236","volume-title":"IEEE","author":"Xu W.","year":"2015","unstructured":"W. Xu and H. Chen , \" Scalable rumor source detection under independent cascade model in online social networks,\" in 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN) . IEEE , 2015 , pp. 236 -- 242 . W. Xu and H. Chen, \"Scalable rumor source detection under independent cascade model in online social networks,\" in 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN). IEEE, 2015, pp. 236--242."},{"key":"e_1_3_2_1_12_1","first-page":"109","volume-title":"Exploiting context for rumour detection in social media,\" in International Conference on Social Informatics","author":"Zubiaga A.","year":"2017","unstructured":"A. Zubiaga , M. Liakata , and R. Procter , \" Exploiting context for rumour detection in social media,\" in International Conference on Social Informatics . Springer , 2017 , pp. 109 -- 123 . A. Zubiaga, M. Liakata, and R. Procter, \"Exploiting context for rumour detection in social media,\" in International Conference on Social Informatics. Springer, 2017, pp. 109--123."},{"key":"e_1_3_2_1_13_1","first-page":"228","volume-title":"ACM","author":"Maddock J.","year":"2015","unstructured":"J. Maddock , K. Starbird , H. J. Al-Hassani , D. E. Sandoval , M. Orand , and R. M. Mason , \" Characterizing online rumoring behavior using multi-dimensional signatures,\" in Proceedings of the 18th ACM conference on computer supported cooperative work & social computing . ACM , 2015 , pp. 228 -- 241 . J. Maddock, K. Starbird, H. J. Al-Hassani, D. E. Sandoval, M. Orand, and R. M. Mason, \"Characterizing online rumoring behavior using multi-dimensional signatures,\" in Proceedings of the 18th ACM conference on computer supported cooperative work & social computing. ACM, 2015, pp. 228--241."},{"key":"e_1_3_2_1_14_1","volume-title":"Canada. Ontario: Human Systems Incorporated","author":"Baxter C.","year":"2015","unstructured":"C. Baxter , P. Barratt , and M. Thomson , \" Social media and the generation, propagation, and debunking of rumours,\" Report on behalf of Department of National Defence , Canada. Ontario: Human Systems Incorporated , 2015 . C. Baxter, P. Barratt, and M. Thomson, \"Social media and the generation, propagation, and debunking of rumours,\" Report on behalf of Department of National Defence, Canada. Ontario: Human Systems Incorporated, 2015."},{"key":"e_1_3_2_1_15_1","first-page":"466","volume-title":"ACM","author":"Arif A.","year":"2016","unstructured":"A. Arif , K. Shanahan , F.-J. Chou , Y. Dosouto , K. Starbird , and E. S. Spiro , \" How information snowballs: Exploring the role of exposure in online rumor propagation,\" in Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing . ACM , 2016 , pp. 466 -- 477 . A. Arif, K. Shanahan, F.-J. Chou, Y. Dosouto, K. Starbird, and E. S. Spiro, \"How information snowballs: Exploring the role of exposure in online rumor propagation,\" in Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 2016, pp. 466--477."},{"key":"e_1_3_2_1_16_1","first-page":"1395","volume-title":"WWW '15. International World Wide Web Conferences Steering Committee","author":"Zhao Z.","year":"2015","unstructured":"Z. Zhao , P. Resnick , and Q. Mei , \" Enquiring minds: Early detection of rumors in social media from enquiry posts,\" in Proceedings of the 24th International Conference on World Wide Web, ser . WWW '15. International World Wide Web Conferences Steering Committee , 2015 , pp. 1395 -- 1405 . Z. Zhao, P. Resnick, and Q. Mei, \"Enquiring minds: Early detection of rumors in social media from enquiry posts,\" in Proceedings of the 24th International Conference on World Wide Web, ser. WWW '15. International World Wide Web Conferences Steering Committee, 2015, pp. 1395--1405."},{"key":"e_1_3_2_1_17_1","volume-title":"Deep contextualized word representations,\" arXiv preprint arXiv:1802.05365","author":"Peters M. E.","year":"2018","unstructured":"M. E. Peters , M. Neumann , M. Iyyer , M. Gardner , C. Clark , K. Lee , and L. Zettlemoyer , \" Deep contextualized word representations,\" arXiv preprint arXiv:1802.05365 , 2018 . M. E. Peters, M. Neumann, M. Iyyer, M. Gardner, C. Clark, K. Lee, and L. Zettlemoyer, \"Deep contextualized word representations,\" arXiv preprint arXiv:1802.05365, 2018."},{"key":"e_1_3_2_1_18_1","unstructured":"X. Zhang J. Zhao and Y. LeCun \"Character-level convolutional networks for text classification \" in Advances in neural information processing systems 2015 pp. 649--657.  X. Zhang J. Zhao and Y. LeCun \"Character-level convolutional networks for text classification \" in Advances in neural information processing systems 2015 pp. 649--657."},{"key":"e_1_3_2_1_19_1","first-page":"1041","article-title":"Tweet2vec: Learning tweet embeddings using character-level cnn-lstm encoder-decoder,\" in Proceedings of the 39th International ACM SIGIR conference on Research and Development","author":"Vosoughi S.","year":"2016","unstructured":"S. Vosoughi , P. Vijayaraghavan , and D. Roy , \" Tweet2vec: Learning tweet embeddings using character-level cnn-lstm encoder-decoder,\" in Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval , 2016 , pp. 1041 -- 1044 . S. Vosoughi, P. Vijayaraghavan, and D. Roy, \"Tweet2vec: Learning tweet embeddings using character-level cnn-lstm encoder-decoder,\" in Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016, pp. 1041--1044.","journal-title":"Information Retrieval"},{"key":"e_1_3_2_1_20_1","volume-title":"Deepstance at semeval-2016 task 6: Detecting stance in tweets using character and word-level cnns,\" arXiv preprint arXiv:1606.05694","author":"Vijayaraghavan P.","year":"2016","unstructured":"P. Vijayaraghavan , I. Sysoev , S. Vosoughi , and D. Roy , \" Deepstance at semeval-2016 task 6: Detecting stance in tweets using character and word-level cnns,\" arXiv preprint arXiv:1606.05694 , 2016 . P. Vijayaraghavan, I. Sysoev, S. Vosoughi, and D. Roy, \"Deepstance at semeval-2016 task 6: Detecting stance in tweets using character and word-level cnns,\" arXiv preprint arXiv:1606.05694, 2016."},{"key":"e_1_3_2_1_21_1","first-page":"452","volume-title":"Data augmentation by words with paradigmatic relations,\" in Proceedings of the 2018 Conference of the North American","author":"Kobayashi S.","year":"2018","unstructured":"S. Kobayashi , \"Contextual augmentation : Data augmentation by words with paradigmatic relations,\" in Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 2 (Short Papers). New Orleans , Louisiana : Association for Computational Linguistics , Jun. 2018 , pp. 452 -- 457 . S. Kobayashi, \"Contextual augmentation: Data augmentation by words with paradigmatic relations,\" in Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 2 (Short Papers). New Orleans, Louisiana: Association for Computational Linguistics, Jun. 2018, pp. 452--457."},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Banglore","author":"Abulaish M.","year":"2019","unstructured":"M. Abulaish and K. Sah , Amit, \"A text data augmentation approach for improving the performance of cnn,\" in Proceedings of the MINDS Workshop,the 11th International Conference on Communication Systems and Networks (COMSNETS) , Banglore , India , 2019 , pp. 1 -- 6 . M. Abulaish and K. Sah, Amit, \"A text data augmentation approach for improving the performance of cnn,\" in Proceedings of the MINDS Workshop,the 11th International Conference on Communication Systems and Networks (COMSNETS), Banglore, India, 2019, pp. 1--6."},{"key":"e_1_3_2_1_23_1","volume-title":"Atalaya at tass 2018: Sentiment analysis with tweet embeddings and data augmentation,\" Proceedings of TASS","author":"Luque F. M.","year":"2018","unstructured":"F. M. Luque and J. M. P\u00e9rez , \" Atalaya at tass 2018: Sentiment analysis with tweet embeddings and data augmentation,\" Proceedings of TASS , vol. 2172 , 2018 . F. M. Luque and J. M. P\u00e9rez, \"Atalaya at tass 2018: Sentiment analysis with tweet embeddings and data augmentation,\" Proceedings of TASS, vol. 2172, 2018."},{"key":"e_1_3_2_1_24_1","first-page":"994","volume-title":"ACM","author":"Olteanu A.","year":"2015","unstructured":"A. Olteanu , S. Vieweg , and C. Castillo , \" What to expect when the unexpected happens: Social media communications across crises,\" in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing . ACM , 2015 , pp. 994 -- 1009 . A. Olteanu, S. Vieweg, and C. Castillo, \"What to expect when the unexpected happens: Social media communications across crises,\" in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 2015, pp. 994--1009."},{"key":"e_1_3_2_1_25_1","first-page":"974","article-title":"A longitudinal assessment of the persistence of twitter datasets","volume":"69","author":"Zubiaga A.","year":"2018","unstructured":"A. Zubiaga , \" A longitudinal assessment of the persistence of twitter datasets ,\" JASIST , vol. 69 , pp. 974 -- 984 , 2018 . A. Zubiaga, \"A longitudinal assessment of the persistence of twitter datasets,\" JASIST, vol. 69, pp. 974--984, 2018.","journal-title":"JASIST"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00194"},{"key":"e_1_3_2_1_27_1","volume-title":"Credbank: A large-scale social media corpus with associated credibility annotations,\" in Ninth International AAAI Conference on Web and Social Media","author":"Mitra T.","year":"2015","unstructured":"T. Mitra and E. Gilbert , \" Credbank: A large-scale social media corpus with associated credibility annotations,\" in Ninth International AAAI Conference on Web and Social Media , 2015 . T. Mitra and E. Gilbert, \"Credbank: A large-scale social media corpus with associated credibility annotations,\" in Ninth International AAAI Conference on Web and Social Media, 2015."},{"key":"e_1_3_2_1_28_1","first-page":"177","volume-title":"ACM","author":"Yang J.","year":"2011","unstructured":"J. Yang and J. Leskovec , \" Patterns of temporal variation in online media,\" in Proceedings of the fourth ACM international conference on Web search and data mining . ACM , 2011 , pp. 177 -- 186 . J. Yang and J. Leskovec, \"Patterns of temporal variation in online media,\" in Proceedings of the fourth ACM international conference on Web search and data mining. ACM, 2011, pp. 177--186."},{"key":"e_1_3_2_1_29_1","volume-title":"Event detection in twitter using aggressive filtering and hierarchical tweet clustering,\" in Second Workshop on Social News on the Web (SNOW)","author":"Ifrim G.","year":"2014","unstructured":"G. Ifrim , B. Shi , and I. Brigadir , \" Event detection in twitter using aggressive filtering and hierarchical tweet clustering,\" in Second Workshop on Social News on the Web (SNOW) , Seoul, Korea . ACM , 2014 . G. Ifrim, B. Shi, and I. Brigadir, \"Event detection in twitter using aggressive filtering and hierarchical tweet clustering,\" in Second Workshop on Social News on the Web (SNOW), Seoul, Korea. ACM, 2014."},{"key":"e_1_3_2_1_30_1","volume-title":"Reading the riots on twitter: methodological innovation for the analysis of big data,\" International journal of social research methodology","author":"Procter R.","unstructured":"R. Procter , F. Vis , and A. Voss , \" Reading the riots on twitter: methodological innovation for the analysis of big data,\" International journal of social research methodology , vol. 16 , no. 3, pp. 197--214, 2013. R. Procter, F. Vis, and A. Voss, \"Reading the riots on twitter: methodological innovation for the analysis of big data,\" International journal of social research methodology, vol. 16, no. 3, pp. 197--214, 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Y. Kim \"Convolutional neural networks for sentence classification \" arXiv preprint arXiv:1408.5882 2014.  Y. Kim \"Convolutional neural networks for sentence classification \" arXiv preprint arXiv:1408.5882 2014.","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_1_32_1","volume-title":"Evaluation of sentence embeddings in downstream and linguistic probing tasks,\" arXiv preprint arXiv:1806.06259","author":"Perone C. S.","year":"2018","unstructured":"C. S. Perone , R. Silveira , and T. S. Paula , \" Evaluation of sentence embeddings in downstream and linguistic probing tasks,\" arXiv preprint arXiv:1806.06259 , 2018 . C. S. Perone, R. Silveira, and T. S. Paula, \"Evaluation of sentence embeddings in downstream and linguistic probing tasks,\" arXiv preprint arXiv:1806.06259, 2018."}],"event":{"name":"ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining","location":"Vancouver British Columbia Canada","acronym":"ASONAM '19","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","IEEE CS"]},"container-title":["Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341161.3342892","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341161.3342892","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:25Z","timestamp":1750199905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341161.3342892"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,27]]},"references-count":32,"alternative-id":["10.1145\/3341161.3342892","10.1145\/3341161"],"URL":"https:\/\/doi.org\/10.1145\/3341161.3342892","relation":{},"subject":[],"published":{"date-parts":[[2019,8,27]]},"assertion":[{"value":"2020-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}