{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:01Z","timestamp":1750220341377,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T00:00:00Z","timestamp":1639699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,17]]},"DOI":"10.1145\/3508230.3508246","type":"proceedings-article","created":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T22:07:38Z","timestamp":1646777258000},"page":"109-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Pandemic rumor identification on social networking sites: A case study of COVID-19"],"prefix":"10.1145","author":[{"given":"Mohsan","family":"Ali","sequence":"first","affiliation":[{"name":"National Center for Cybersecurity, Air University Islamabad, Pakistan"}]},{"given":"Iqbal","family":"Murtza","sequence":"additional","affiliation":[{"name":"Department of Creative Technologies, Air University Islamabad, Pakistan"}]},{"given":"Ayesha","family":"Ejaz","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Air University Islamabad, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2022,3,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Azmi","author":"Alzanin Samah M.","year":"2018","unstructured":"Samah M. Alzanin and Aqil M . Azmi . 2018 . Detecting rumors in social media: A survey. Procedia Comput. Sci . 142, (2018), 294\u2013300. DOI:https:\/\/doi.org\/10.1016\/j.procs.2018.10.495 10.1016\/j.procs.2018.10.495 Samah M. Alzanin and Aqil M. Azmi. 2018. Detecting rumors in social media: A survey. Procedia Comput. Sci. 142, (2018), 294\u2013300. DOI:https:\/\/doi.org\/10.1016\/j.procs.2018.10.495"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCloud.2017.40"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Rumor spreading model considering rumor credibility, correlation and crowd classification based on personality. Sci","volume":"10","author":"Chen Xuelong","year":"2020","unstructured":"Xuelong Chen and Nan Wang . 2020 . Rumor spreading model considering rumor credibility, correlation and crowd classification based on personality. Sci . Rep. 10 , 1 (2020), 1 \u2013 15 . DOI:https:\/\/doi.org\/10.1038\/s41598-020-62585-9 10.1038\/s41598-020-62585-9 Xuelong Chen and Nan Wang. 2020. Rumor spreading model considering rumor credibility, correlation and crowd classification based on personality. Sci. Rep. 10, 1 (2020), 1\u201315. DOI:https:\/\/doi.org\/10.1038\/s41598-020-62585-9","journal-title":"Rep."},{"key":"e_1_3_2_1_4_1","volume-title":"RP-DNN: A Tweet level propagation context based deep neural networks for early rumor detection in Social Media. Cc","author":"Gao Jie","year":"2020","unstructured":"Jie Gao , Sooji Han , Xingyi Song , and Fabio Ciravegna . 2020. RP-DNN: A Tweet level propagation context based deep neural networks for early rumor detection in Social Media. Cc ( 2020 ). Retrieved from http:\/\/arxiv.org\/abs\/2002.12683 Jie Gao, Sooji Han, Xingyi Song, and Fabio Ciravegna. 2020. RP-DNN: A Tweet level propagation context based deep neural networks for early rumor detection in Social Media. Cc (2020). Retrieved from http:\/\/arxiv.org\/abs\/2002.12683"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3201\/eid0602.000201"},{"key":"e_1_3_2_1_6_1","first-page":"80","article-title":"Tracking Student Sentiment from Social Media","volume":"6","author":"Guo Dahai","year":"2015","unstructured":"Dahai Guo . 2015 . Tracking Student Sentiment from Social Media . J. Adv. Inf. Technol. 6 , 2 (2015), 80 \u2013 83 . DOI:https:\/\/doi.org\/10.12720\/jait.6.2.80-83 10.12720\/jait.6.2.80-83 Dahai Guo. 2015. Tracking Student Sentiment from Social Media. J. Adv. Inf. Technol. 6, 2 (2015), 80\u201383. DOI:https:\/\/doi.org\/10.12720\/jait.6.2.80-83","journal-title":"J. Adv. Inf. Technol."},{"key":"#cr-split#-e_1_3_2_1_7_1.1","doi-asserted-by":"crossref","unstructured":"Adil Imad Eddine Hosni Kan Li and Sadique Ahmad. 2020. Minimizing rumor influence in multiplex online social networks based on human individual and social behaviors. Inf. Sci. (Ny). 512 (2020) 1458-1480. DOI:https:\/\/doi.org\/10.1016\/j.ins.2019.10.063 10.1016\/j.ins.2019.10.063","DOI":"10.1016\/j.ins.2019.10.063"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","doi-asserted-by":"crossref","unstructured":"Adil Imad Eddine Hosni Kan Li and Sadique Ahmad. 2020. Minimizing rumor influence in multiplex online social networks based on human individual and social behaviors. Inf. Sci. (Ny). 512 (2020) 1458-1480. DOI:https:\/\/doi.org\/10.1016\/j.ins.2019.10.063","DOI":"10.1016\/j.ins.2019.10.063"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.7.2.81-87"},{"key":"e_1_3_2_1_9_1","unstructured":"John Dewey. 2012. Human Nature and Conduct An introduction to social psychology.  John Dewey. 2012. Human Nature and Conduct An introduction to social psychology."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.12720\/jait.11.2.97-102"},{"key":"e_1_3_2_1_11_1","first-page":"19","volume-title":"ACL 2019 - 57th Annu. Meet. Assoc. Comput. Linguist. Proc. Conf. (2020","author":"Kumar Sumeet","year":"1865","unstructured":"Sumeet Kumar and Kathleen M. Carley . 2020. Tree LSTMs with convolution units to predict stance and rumor veracity in social media conversations . ACL 2019 - 57th Annu. Meet. Assoc. Comput. Linguist. Proc. Conf. (2020 ), 5047\u20135058. DOI:https:\/\/doi.org\/10. 1865 3\/v1\/p 19 - 1498 10.18653\/v1 Sumeet Kumar and Kathleen M. Carley. 2020. Tree LSTMs with convolution units to predict stance and rumor veracity in social media conversations. ACL 2019 - 57th Annu. Meet. Assoc. Comput. Linguist. Proc. Conf. (2020), 5047\u20135058. DOI:https:\/\/doi.org\/10.18653\/v1\/p19-1498"},{"key":"e_1_3_2_1_12_1","unstructured":"Filip Markoski Eftim Zdravevski Nikola Ljube\u0161i\u0107 and Sonja Gievska. Evaluation of Recurrent Neural Network architectures for abusive language detection in cyberbullying contexts.  Filip Markoski Eftim Zdravevski Nikola Ljube\u0161i\u0107 and Sonja Gievska. Evaluation of Recurrent Neural Network architectures for abusive language detection in cyberbullying contexts."},{"key":"e_1_3_2_1_13_1","first-page":"141","article-title":"Building a Learning Machine Classifier with Inadequate Data for Crime Prediction","volume":"8","author":"Nguyen Trung T.","year":"2017","unstructured":"Trung T. Nguyen , Amartya Hatua , and Andrew H. Sung . 2017 . Building a Learning Machine Classifier with Inadequate Data for Crime Prediction . J. Adv. Inf. Technol. 8 , 2 (2017), 141 \u2013 147 . DOI:https:\/\/doi.org\/10.12720\/jait.8.2.141-147 10.12720\/jait.8.2.141-147 Trung T. Nguyen, Amartya Hatua, and Andrew H. Sung. 2017. Building a Learning Machine Classifier with Inadequate Data for Crime Prediction. J. Adv. Inf. Technol. 8, 2 (2017), 141\u2013147. DOI:https:\/\/doi.org\/10.12720\/jait.8.2.141-147","journal-title":"J. Adv. Inf. Technol."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.281"},{"key":"e_1_3_2_1_15_1","first-page":"221","article-title":"Instance Analysis of QQ Group Chat Record Based on Social Network Analysis Method","volume":"6","author":"Shen Yuchen","year":"2015","unstructured":"Yuchen Shen , Zhu Gao , and Junhui Gao . 2015 . Instance Analysis of QQ Group Chat Record Based on Social Network Analysis Method . J. Adv. Inf. Technol. 6 , 4 (2015), 221 \u2013 226 . DOI:https:\/\/doi.org\/10.12720\/jait.6.4.221-226 10.12720\/jait.6.4.221-226 Yuchen Shen, Zhu Gao, and Junhui Gao. 2015. Instance Analysis of QQ Group Chat Record Based on Social Network Analysis Method. J. Adv. Inf. Technol. 6, 4 (2015), 221\u2013226. DOI:https:\/\/doi.org\/10.12720\/jait.6.4.221-226","journal-title":"J. Adv. Inf. Technol."},{"key":"e_1_3_2_1_16_1","unstructured":"S Vijayarani Ms J Ilamathi and Ms Nithya. Preprocessing Techniques for Text Mining - An Overview. 5 1 7\u201316.  S Vijayarani Ms J Ilamathi and Ms Nithya. Preprocessing Techniques for Text Mining - An Overview. 5 1 7\u201316."},{"key":"e_1_3_2_1_17_1","first-page":"147","article-title":"Automatic Detection and Verification of Rumors on Twitter","volume":"2008","year":"2015","unstructured":"Vosoughi. 2015 . Automatic Detection and Verification of Rumors on Twitter . Massachusetts Inst. Technol. 2008 (2015), 147 . Retrieved from https:\/\/www.media.mit.edu\/cogmac\/publications\/Soroush_Vosoughi_PHD_thesis.pdf Vosoughi. 2015. Automatic Detection and Verification of Rumors on Twitter. Massachusetts Inst. Technol. 2008 (2015), 147. Retrieved from https:\/\/www.media.mit.edu\/cogmac\/publications\/Soroush_Vosoughi_PHD_thesis.pdf","journal-title":"Massachusetts Inst. Technol."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Soroush Vosoughi. 2018. The spread of true and false news online. Soc. Sci. (2018).  Soroush Vosoughi. 2018. The spread of true and false news online. Soc. Sci. (2018).","DOI":"10.1126\/science.aap9559"},{"key":"e_1_3_2_1_19_1","unstructured":"WHO. 2019. What to do if you feel unwell. Retrieved from https:\/\/www.who.int\/emergencies\/diseases\/novel-coronavirus-2019\/advice-for-public  WHO. 2019. What to do if you feel unwell. Retrieved from https:\/\/www.who.int\/emergencies\/diseases\/novel-coronavirus-2019\/advice-for-public"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741637"}],"event":{"name":"NLPIR 2021: 2021 5th International Conference on Natural Language Processing and Information Retrieval","acronym":"NLPIR 2021","location":"Sanya China"},"container-title":["2021 5th International Conference on Natural Language Processing and Information Retrieval (NLPIR)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508230.3508246","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508230.3508246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:31Z","timestamp":1750191151000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508230.3508246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,17]]},"references-count":21,"alternative-id":["10.1145\/3508230.3508246","10.1145\/3508230"],"URL":"https:\/\/doi.org\/10.1145\/3508230.3508246","relation":{},"subject":[],"published":{"date-parts":[[2021,12,17]]},"assertion":[{"value":"2022-03-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}