{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T09:01:31Z","timestamp":1768813291819,"version":"3.49.0"},"reference-count":174,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62162031, 61772246, 61728205, and 61876074"],"award-info":[{"award-number":["62162031, 61772246, 61728205, and 61876074"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Joint Funding Project of Jiangxi Science and Technology Plan","award":["20192ACBL21030"],"award-info":[{"award-number":["20192ACBL21030"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2023,1,31]]},"abstract":"<jats:p>With the proliferation of social sensing, large amounts of observation are contributed by people or devices. However, these observations contain disinformation. Disinformation can propagate across online social networks at a relatively low cost, but result in a series of major problems in our society. In this survey, we provide a comprehensive overview of disinformation and truth discovery in social sensing under a unified perspective, including basic concepts and the taxonomy of existing methodologies. Furthermore, we summarize the mechanism of disinformation from four different perspectives (i.e., text only, text with image\/multi-modal, text with propagation, and fusion models). In addition, we review existing solutions based on these requirements and compare their pros and cons and give a sort of guide to usage based on a detailed lesson learned. To facilitate future studies in this field, we summarize related publicly accessible real-world data sets and open source codes. Last but the most important, we emphasize potential future research topics and challenges in this domain through a deep analysis of most recent methods.<\/jats:p>","DOI":"10.1145\/3477138","type":"journal-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T17:36:59Z","timestamp":1637689019000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["A Unified Perspective for Disinformation Detection and Truth Discovery in Social Sensing: A Survey"],"prefix":"10.1145","volume":"55","author":[{"given":"Fan","family":"Xu","sequence":"first","affiliation":[{"name":"Jiangxi Normal University, Nanchang, China"}]},{"given":"Victor S.","family":"Sheng","sequence":"additional","affiliation":[{"name":"Texas Tech University, Lubbock, TX, USA"}]},{"given":"Mingwen","family":"Wang","sequence":"additional","affiliation":[{"name":"Jiangxi Normal University, Nanchang, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.5555\/2440177"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.495"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S19-2193"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568040"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.insights-1.7"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5393"},{"key":"e_1_3_3_8_2","unstructured":"Juan Cao Junbo Guo Xirong Li Zhiwei Jin Han Guo and Jintao Li. 2018. Automatic rumor detection on microblogs: A survey. arXiv: 1807.03505v1 (2018)."},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.561"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380054"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370288"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1002\/widm.20"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715687"},{"key":"e_1_3_3_16_2","first-page":"1","article-title":"Maximum likelihood from incomplete data via the EM algorithm","author":"Dempster A. P.","year":"1977","unstructured":"A. P. Dempster, N. M. Laird, and D. B. Rubin. 1977. Maximum likelihood from incomplete data via the EM algorithm. J. Roy. Statist. Soc. Series B (Methodol.) (1977), 1\u201338. DOI:10.1111\/j.2517-6161.1977.tb01600.x","journal-title":"J. Roy. Statist. Soc. Series B (Methodol.)"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1177\/0392192107073433"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5508"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S19-2192"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188730"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-1138"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.5220\/0007188503320339"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814450"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.124"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.558"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010920819831"},{"key":"e_1_3_3_28_2","first-page":"1859","volume-title":"Proceedings of the International Conference on Computational Linguistics (COLING\u201918)","author":"Hanselowski Andreas","year":"2018","unstructured":"Andreas Hanselowski, Avinesh P. V. S., Benjamin Schiller, Felix Caspelherr, Debanjan Chaudhuri, Christian M. Meyer, and Iryna Gurevych. 2018. A retrospective analysis of the fake news challenge stance detection task. In Proceedings of the International Conference on Computational Linguistics (COLING\u201918). 1859\u20131874. DOI:20.08.2018--26.08.2018"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/0740-624X(95)90052-7"},{"key":"e_1_3_3_30_2","article-title":"BIRDNEST: Bayesian inference for ratings-fraud detection","author":"Hooi Bryan","year":"2016","unstructured":"Bryan Hooi, Neil Shah, Alex Beutel, Stephan Gunneman, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2016. BIRDNEST: Bayesian inference for ratings-fraud detection. Computer Science (2016). DOI:10.1137\/1.9781611974348.56","journal-title":"Computer Science"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2015.39"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.5555\/3016100.3016318"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2617078"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.68"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806607"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"e_1_3_3_37_2","first-page":"1546","volume-title":"Proceedings of the International Conference on Computational Linguistics (COLING\u201918)","author":"Karimi Hamid","year":"2018","unstructured":"Hamid Karimi, Proteek Chandan Roy, Sari Saba Sadiya, and Jiliang Tang. 2018. Multi-source multi-class fake news detection. In Proceedings of the International Conference on Computational Linguistics (COLING\u201918). 1546\u20131557."},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1347"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807238"},{"key":"e_1_3_3_40_2","unstructured":"Junaed Younus Khan Md. Tawkat Islam Khondaker Anindya Iqbal and Sadia Afroz. 2019. A benchmark study on machine learning methods for fake news detection. arXiv: 1905.04749v1 (2019)."},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313552"},{"key":"e_1_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6405"},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159734"},{"key":"e_1_3_3_44_2","first-page":"6964","volume-title":"Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL\u201920)","author":"Kochkina Elena","year":"2018","unstructured":"Elena Kochkina and Maria Liakata. 2018. Estimating predictive uncertainty for rumour verification models. In Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics (ACL\u201920). 6964\u20136981. DOI:10.18653\/v1\/2020.acl-main.623"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S17-2083"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.4241459"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1498"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159729"},{"key":"e_1_3_3_49_2","unstructured":"Srijan Kumar and Neil Shah. 2018. False information on web and social media: A survey. arXiv: 1804.08559v1 (2018)."},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883085"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168344"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.61"},{"key":"e_1_3_3_53_2","doi-asserted-by":"crossref","unstructured":"Thai Le Suhang Wang and Dongwon Lee. 2020. MALCOM: Generating malicious comments to attack neural fake news detection models. In Proceedings of the IEEE International Conference on Data Mining (ICDM\u201920) . 282\u2013291. DOI:10.1109\/ICDM50108.2020.00037","DOI":"10.1109\/ICDM50108.2020.00037"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5308-6_9"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.5555\/2283696.2283811"},{"key":"e_1_3_3_56_2","first-page":"634","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","author":"Li Huayi","year":"2015","unstructured":"Huayi Li, Zhiyuan Chen, Arjun Mukherjee, Bing Liu, and Jidong Shao. 2015. Analyzing and detecting opinion spam on a large-scale dataset via temporal and spatial patterns. In Proceedings of the International AAAI Conference on Web and Social Media. 634\u2013637."},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1147"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.473"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610509"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1113"},{"key":"e_1_3_3_61_2","first-page":"97","volume-title":"Proceedings of the International Conference on Very Large Data Bases (VLDB\u201913)","author":"Li Xian","year":"2013","unstructured":"Xian Li, Xin Luna Dong, Kenneth Lyons, Weiyi Meng, and Divesh Srivastava. 2013. Truth finding on the deep web: Is the problem solved? In Proceedings of the International Conference on Very Large Data Bases (VLDB\u201913). 97\u2013102. DOI:10.14778\/2535568.2448943"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897350.2897352"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219998"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577293"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806651"},{"key":"e_1_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.018"},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.5555\/3504035.3504079"},{"key":"e_1_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.48"},{"key":"e_1_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.476"},{"key":"e_1_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188729"},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313741"},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.5555\/3061053.3061153"},{"key":"e_1_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1066"},{"key":"e_1_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1184"},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.5555\/1556176.1556198"},{"key":"e_1_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2017.26"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2016.9"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809719"},{"key":"e_1_3_3_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057114"},{"key":"e_1_3_3_80_2","first-page":"258","volume-title":"Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM\u201915)","author":"Mitra Tanushree","year":"2015","unstructured":"Tanushree Mitra. 2015. CREDBANK: A large-scale social media corpus with associated credibility annotations. In Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM\u201915). 258\u2013267."},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998351"},{"key":"e_1_3_3_82_2","unstructured":"Federico Monti Fabrizio Frasca Davide Eynard Damon Mannion and Michael M. Bronstein. 2019. Fake news detection on social media using geometric deep learning. arXiv: 1902.06673v1 (2019)."},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187863"},{"key":"e_1_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806537"},{"key":"e_1_3_3_85_2","first-page":"1391","volume-title":"Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT\u201919)","author":"Nguyen Duc Minh","year":"2019","unstructured":"Duc Minh Nguyen, Tien Huu Do, Robert Calderbank, and Deligiannis Nikos. 2019. Fake news detection using deep Markov random fields. In Proceedings of the Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT\u201919). 1391\u20131400. DOI:10.18653\/v1\/N19-1141"},{"key":"e_1_3_3_86_2","first-page":"497","volume-title":"Proceedings of the Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT\u201913)","author":"Ott Myle","year":"2013","unstructured":"Myle Ott, Claire Cardie, and Jeffrey T. Hancock. 2013. Negative deceptive opinion spam. In Proceedings of the Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT\u201913). 497\u2013501. DOI:10.1.1.701.8423"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.5555\/2002472.2002512"},{"key":"e_1_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/3350546.3352534"},{"key":"e_1_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1003"},{"key":"e_1_3_3_90_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1022"},{"key":"e_1_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5386"},{"key":"e_1_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.5555\/2145432.2145602"},{"key":"e_1_3_3_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00062"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.5555\/3304222.3304302"},{"key":"e_1_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1317"},{"key":"e_1_3_3_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110121"},{"key":"e_1_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783370"},{"key":"e_1_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00054"},{"key":"e_1_3_3_99_2","unstructured":"P\u00e9rez Ver\u00f3nica Rosas Bennett Kleinberg Alexandra Lefevre and Rada Mihalcea. 2018. Automatic detection of fake news. arXiv: 1708.07104 (2018) 3391\u20133401 pages."},{"key":"e_1_3_3_100_2","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380180"},{"key":"e_1_3_3_101_2","doi-asserted-by":"publisher","DOI":"10.5555\/1920331.1920377"},{"key":"e_1_3_3_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132877"},{"key":"e_1_3_3_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742570"},{"key":"e_1_3_3_104_2","first-page":"3371","volume-title":"Proceedings of the International Conference on Computational Linguistics (COLING\u201918)","author":"Sarkar Sohan De","year":"2018","unstructured":"Sohan De Sarkar, Fan Yang, and Arjun Mukherjee. 2018. Attending sentences to detect satirical fake news. In Proceedings of the International Conference on Computational Linguistics (COLING\u201918). 3371\u20133380."},{"key":"e_1_3_3_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890098"},{"key":"e_1_3_3_106_2","first-page":"1","article-title":"The spread of fake news by social bots","author":"Shao Chengcheng","year":"2018","unstructured":"Chengcheng Shao, Giovanni Luca Ciampaglia, Onur Varol, Alessandro Flammini, and Filippo Menczer. 2018. The spread of fake news by social bots. Nat. Commun. 9 (2018), 1\u20139. DOI:10.1038\/s41467-018-06930-7","journal-title":"Nat. Commun."},{"key":"e_1_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.5555\/975545"},{"key":"e_1_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401965"},{"key":"e_1_3_3_109_2","first-page":"156","volume-title":"Proceedings of the 1st AAAI Conference on Human Computation (HCOMP\u201913)","author":"Sheshadri Aashish","year":"2013","unstructured":"Aashish Sheshadri and Matthew Lease. 2013. SQUARE: A benchmark for research on computing crowd consensus. In Proceedings of the 1st AAAI Conference on Human Computation (HCOMP\u201913). 156\u2013164. DOI:10.1.1.644.2813"},{"key":"e_1_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330935"},{"key":"e_1_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0062"},{"key":"e_1_3_3_112_2","first-page":"1","volume-title":"Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI\u201918)","author":"Shu Kai","year":"2018","unstructured":"Kai Shu, Suhang Wang, and Huan Liu. 2018. Exploiting tri-relationship for fake news detection. In Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI\u201918). 1\u201310."},{"key":"e_1_3_3_113_2","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290994"},{"key":"e_1_3_3_114_2","first-page":"13915","volume-title":"Proceedings of the 34th AAAI Conference on Artificial Intelligence (AAAI\u201920)","author":"Singhal Shivangi","year":"2020","unstructured":"Shivangi Singhal, Anubha Kabra, Mohit Sharma, Rajiv Ratn Shah, Tanmoy Chakraborty, and Ponnurangam Kumaraguru. 2020. SpotFake+: A multimodal framework for fake news detection via transfer learning. In Proceedings of the 34th AAAI Conference on Artificial Intelligence (AAAI\u201920). 13915\u201313916. DOI:10.1609\/aaai.v34i10.7230"},{"key":"e_1_3_3_115_2","first-page":"1","article-title":"Some like it hoax: Automated fake news detection in social networks","author":"Tacchini Eugenio","year":"2017","unstructured":"Eugenio Tacchini, Gabriele Ballarin, Marco L. Della Vedova, Stefano Moret, and Luca de Alfaro. 2017. Some like it hoax: Automated fake news detection in social networks. In Proceedings of the 2nd Workshop on Data Science for Social Good. 1\u201315.","journal-title":"Proceedings of the 2nd Workshop on Data Science for Social Good"},{"key":"e_1_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.163"},{"key":"e_1_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/3201595.3201596"},{"key":"e_1_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.477"},{"key":"e_1_3_3_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871737"},{"key":"e_1_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188722"},{"key":"e_1_3_3_121_2","first-page":"7","volume-title":"Proceedings of the Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT\u201916)","author":"Conroy Yimin Chen, Victoria L. Rubin, Niall J.","year":"2016","unstructured":"Yimin Chen, Victoria L. Rubin, Niall J. Conroy, and Sarah Cornwell. 2016. Fake news or truth? Using satirical cues to detect potentially misleading news. In Proceedings of the Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT\u201916). 7\u201317. DOI:10.18653\/v1\/W16-0802"},{"key":"e_1_3_3_122_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.621"},{"key":"e_1_3_3_123_2","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188728"},{"key":"e_1_3_3_124_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-2102"},{"key":"e_1_3_3_125_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"e_1_3_3_126_2","unstructured":"Dalia Attia Waguih and Laure Berti-Equille. 2014. Truth discovery algorithms: An experimental evaluation. arXiv: 1409.6428 (2014)."},{"key":"e_1_3_3_127_2","doi-asserted-by":"crossref","unstructured":"Biao Wang Chen Ge Luoyi Fu Song Li and Xinbing Wang. 2017. DRIMUX: Dynamic rumor influence minimization with user experience in social networks. IEEE Transactions on Knowledge and Data Engineering 29 10 (2017) 2168\u20132181. DOI:10.1109\/TKDE.2017.2728064","DOI":"10.1109\/TKDE.2017.2728064"},{"key":"e_1_3_3_128_2","doi-asserted-by":"publisher","DOI":"10.5555\/2815540"},{"key":"e_1_3_3_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2013.29"},{"key":"e_1_3_3_130_2","doi-asserted-by":"publisher","DOI":"10.5555\/2602339.2602344"},{"key":"e_1_3_3_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2015.7338333"},{"key":"e_1_3_3_132_2","doi-asserted-by":"publisher","DOI":"10.1145\/2530289"},{"key":"e_1_3_3_133_2","doi-asserted-by":"publisher","DOI":"10.1145\/2185677.2185737"},{"key":"e_1_3_3_134_2","first-page":"408","volume-title":"Proceedings of the International AAAI Conference on Web & Social Media (ICWSM\u201916)","author":"Wang Dong","year":"2016","unstructured":"Dong Wang, Jermaine Marshall, and Chao Huang. 2016. Theme-relevant truth discovery on Twitter: An estimation theoretic approach. In Proceedings of the International AAAI Conference on Web & Social Media (ICWSM\u201916). 408\u2013416."},{"key":"e_1_3_3_135_2","doi-asserted-by":"crossref","unstructured":"William Yang Wang. 2017. \u201cLiar liar pants on fire\u201d: A new benchmark dataset for fake news detection. (2017) 422\u2013426. DOI:10.1145\/3350546.3352552","DOI":"10.18653\/v1\/P17-2067"},{"key":"e_1_3_3_136_2","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3188723"},{"key":"e_1_3_3_137_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219903"},{"key":"e_1_3_3_138_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5389"},{"key":"e_1_3_3_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2765699"},{"key":"e_1_3_3_140_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1485"},{"key":"e_1_3_3_141_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1385"},{"key":"e_1_3_3_142_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159677"},{"key":"e_1_3_3_143_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1471"},{"key":"e_1_3_3_144_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.727"},{"key":"e_1_3_3_145_2","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339662"},{"key":"e_1_3_3_146_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106391"},{"key":"e_1_3_3_147_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.014"},{"key":"e_1_3_3_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842343"},{"key":"e_1_3_3_149_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2895834"},{"key":"e_1_3_3_150_2","unstructured":"Kai-Chou Yang Timothy Niven and Kao Hung-Yu. 2019. Fake news detection as natural language inference. arXiv: 1907.07347v1 (2019)."},{"key":"e_1_3_3_151_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015644"},{"key":"e_1_3_3_152_2","doi-asserted-by":"publisher","DOI":"10.5555\/3491440.3491637"},{"key":"e_1_3_3_153_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133990"},{"key":"e_1_3_3_154_2","unstructured":"Junting Ye Santhosh Kumar and Leman Akoglu. 2016. Temporal opinion spam detection by multivariate indicative signals. In Proceedings of the International AAAI Conference on Web & Social Media (ICWSM\u201916) . 743\u2013746."},{"key":"e_1_3_3_155_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.6"},{"key":"e_1_3_3_156_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301791"},{"key":"e_1_3_3_157_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.108"},{"key":"e_1_3_3_158_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00090"},{"key":"e_1_3_3_159_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.coling-main.475"},{"key":"e_1_3_3_160_2","doi-asserted-by":"publisher","DOI":"10.1145\/3309699"},{"key":"e_1_3_3_161_2","unstructured":"Rowan Zellers Ari Holtzman Hannah Rashkin Yonatan Bisk Ali Farhadi Franziska Roesner and Cho Yejin. 2019. Defending against neural fake news. arXiv: 1905.12616v1 (2019)."},{"key":"e_1_3_3_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.248"},{"key":"e_1_3_3_163_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.064"},{"key":"e_1_3_3_164_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.01.068"},{"key":"e_1_3_3_165_2","doi-asserted-by":"publisher","DOI":"10.5555\/3382225.3382257"},{"key":"e_1_3_3_166_2","doi-asserted-by":"publisher","DOI":"10.5555\/2789272.2912090"},{"key":"e_1_3_3_167_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9491-9"},{"key":"e_1_3_3_168_2","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741637"},{"key":"e_1_3_3_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819134"},{"key":"e_1_3_3_170_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2753245"},{"key":"e_1_3_3_171_2","unstructured":"Xinyi Zhou and Reza Zafarani. 2018. Fake news: A survey of research detection methods and opportunities. arXiv: 1812.00315v1 (2018)."},{"key":"e_1_3_3_172_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1216"},{"key":"e_1_3_3_173_2","doi-asserted-by":"publisher","DOI":"10.1145\/3161603"},{"key":"e_1_3_3_174_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0163-y"},{"key":"e_1_3_3_175_2","doi-asserted-by":"crossref","unstructured":"Arkaitz Zubiaga Maria Liakata Rob Procter Geraldine Wong Sak Hoi and Peter Tolmie. 2016. Analysing how people orient to and spread rumours in social media by looking at conversational threads. PLoS One 11 3 (2016). DOI:10.1371\/journal.pone.0150989","DOI":"10.1371\/journal.pone.0150989"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477138","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:03Z","timestamp":1750193343000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477138"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,23]]},"references-count":174,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1,31]]}},"alternative-id":["10.1145\/3477138"],"URL":"https:\/\/doi.org\/10.1145\/3477138","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,23]]},"assertion":[{"value":"2019-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}