{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:33:06Z","timestamp":1776094386407,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539277","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:12Z","timestamp":1660331172000},"page":"2253-2262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Reinforcement Subgraph Reasoning for Fake News Detection"],"prefix":"10.1145","author":[{"given":"Ruichao","family":"Yang","sequence":"first","affiliation":[{"name":"Hong Kong Baptist University, Hong Kong SAR, Hong Kong"}]},{"given":"Xiting","family":"Wang","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Yiqiao","family":"Jin","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA, USA"}]},{"given":"Chaozhuo","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Jianxun","family":"Lian","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Xing","family":"Xie","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Antoine Bordes Nicolas Usunier Alberto Garcia-Duran Jason Weston and Oksana Yakhnenko. 2013. Translating embeddings for modeling multi-relational data. In NeurIPS."},{"key":"e_1_3_2_1_2_1","volume-title":"The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30, 1--7","author":"Brin Sergey","year":"1998","unstructured":"Sergey Brin and Lawrence Page. 1998. The anatomy of a large-scale hypertextual web search engine. Computer networks and ISDN systems 30, 1--7 (1998), 107--117."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Carlos Castillo Marcelo Mendoza and Barbara Poblete. 2011. Information credibility on twitter. In WWW.","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Lu Cheng Ruocheng Guo Kai Shu and Huan Liu. 2021. Causal Understanding of Fake News Dissemination on Social Media. In KDD.","DOI":"10.1145\/3447548.3467321"},{"key":"e_1_3_2_1_5_1","volume-title":"ARTICLE","author":"Collobert Ronan","year":"2011","unstructured":"Ronan Collobert, JasonWeston, L\u00e9on Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. 2011. Natural language processing (almost) from scratch. JMLR 12, ARTICLE (2011), 2493--2537."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Zhuyun Dai Chenyan Xiong Jamie Callan and Zhiyuan Liu. 2018. Convolutional neural networks for soft-matching n-grams in ad-hoc search. In WSDM.","DOI":"10.1145\/3159652.3159659"},{"key":"e_1_3_2_1_7_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL.","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Y Dou K Shu C Xia PS Yu and L Sun. 2021. User Preference-aware Fake News Detection. In SIGIR.","DOI":"10.1145\/3404835.3462990"},{"key":"e_1_3_2_1_9_1","unstructured":"Yajuan Duan Zhumin Chen Furu Wei Ming Zhou and Heung Yeung Shum. 2012. Twitter topic summarization by ranking tweets using social influence and content quality. In COLING."},{"key":"e_1_3_2_1_10_1","volume-title":"KAN: Knowledge-aware Attention Network for Fake News Detection. In AAAI.","author":"Dun Yaqian","year":"2021","unstructured":"Yaqian Dun, Kefei Tu, Chen Chen, Chunyan Hou, and Xiaojie Yuan. 2021. KAN: Knowledge-aware Attention Network for Fake News Detection. In AAAI."},{"key":"e_1_3_2_1_11_1","volume-title":"Reinforcement Routing on Proximity Graph for Efficient Recommendation. TOIS","author":"Feng Chao","year":"2022","unstructured":"Chao Feng, Defu Lian, Xiting Wang, Zheng Liu, Xing Xie, and Enhong Chen. 2022. Reinforcement Routing on Proximity Graph for Efficient Recommendation. TOIS (2022)."},{"key":"e_1_3_2_1_12_1","volume-title":"SDG: A Simplified and Dynamic Graph Neural Network. In SIGIR.","author":"Fu Dongqi","year":"2021","unstructured":"Dongqi Fu and Jingrui He. 2021. SDG: A Simplified and Dynamic Graph Neural Network. In SIGIR."},{"key":"e_1_3_2_1_13_1","unstructured":"Jingyue Gao XitingWang YashaWang Yulan Yan and Xing Xie. 2021. Learning Groupwise Explanations for Black-Box Models. In IJCAI."},{"key":"e_1_3_2_1_14_1","unstructured":"Linmei Hu Tianchi Yang Luhao Zhang Wanjun Zhong Duyu Tang Chuan Shi Nan Duan and Ming Zhou. 2021. Compare to The Knowledge: Graph Neural Fake News Detection with External Knowledge. In ACL."},{"key":"e_1_3_2_1_15_1","unstructured":"Yiqiao Jin Xiting Wang Ruichao Yang Yizhou Sun Wei Wang Hao Liao and Xing Xie. 2022. Towards Fine-Grained Reasoning for Fake News Detection. In AAAI."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10183-2"},{"key":"e_1_3_2_1_17_1","volume-title":"Zhong Qian, and Jing Jiang.","author":"Serena Khoo Ling Min","year":"2020","unstructured":"Ling Min Serena Khoo, Hai Leong Chieu, Zhong Qian, and Jing Jiang. 2020. Interpretable rumor detection in microblogs by attending to user interactions. In AAAI."},{"key":"e_1_3_2_1_18_1","volume-title":"Adam: A Method for Stochastic Optimization. In ICLR.","author":"Kingma Diederik P","year":"2015","unstructured":"Diederik P Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In ICLR."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Sejeong Kwon Meeyoung Cha Kyomin Jung Wei Chen and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In ICDM.","DOI":"10.1109\/ICDM.2013.61"},{"key":"e_1_3_2_1_20_1","volume-title":"Colleen M Seifert, Norbert Schwarz, and John Cook.","author":"Lewandowsky Stephan","year":"2012","unstructured":"Stephan Lewandowsky, Ullrich KH Ecker, Colleen M Seifert, Norbert Schwarz, and John Cook. 2012. Misinformation and its correction: Continued influence and successful debiasing. Psychological science in the public interest 13, 3 (2012), 106--131."},{"key":"e_1_3_2_1_21_1","volume-title":"A simple, fast diverse decoding algorithm for neural generation. arXiv preprint arXiv:1611.08562","author":"Li Jiwei","year":"2016","unstructured":"Jiwei Li, Will Monroe, and Dan Jurafsky. 2016. A simple, fast diverse decoding algorithm for neural generation. arXiv preprint arXiv:1611.08562 (2016)."},{"key":"e_1_3_2_1_22_1","unstructured":"Danyang Liu Jianxun Lian Zheng Liu Xiting Wang Guangzhong Sun and Xing Xie. 2021. Reinforced Anchor Knowledge Graph Generation for News Recommendation Reasoning. In KDD."},{"key":"e_1_3_2_1_23_1","first-page":"250","article-title":"An uncertainty-aware approach for exploratory microblog retrieval","volume":"22","author":"Liu Mengchen","year":"2015","unstructured":"Mengchen Liu, Shixia Liu, Xizhou Zhu, Qinying Liao, Furu Wei, and Shimei Pan. 2015. An uncertainty-aware approach for exploratory microblog retrieval. TVCG 22, 1 (2015), 250--259.","journal-title":"TVCG"},{"key":"e_1_3_2_1_24_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"key":"e_1_3_2_1_25_1","unstructured":"Zhenghao Liu Chenyan Xiong Maosong Sun and Zhiyuan Liu. 2020. Finegrained Fact Verification with Kernel Graph Attention Network. In ACL."},{"key":"e_1_3_2_1_26_1","volume-title":"GCAN: Graph-aware Co-Attention Networks for Explainable Fake News Detection on Social Media. In ACL.","author":"Lu Yi-Ju","year":"2020","unstructured":"Yi-Ju Lu and Cheng-Te Li. 2020. GCAN: Graph-aware Co-Attention Networks for Explainable Fake News Detection on Social Media. In ACL."},{"key":"e_1_3_2_1_27_1","unstructured":"Jing Ma Wei Gao Prasenjit Mitra Sejeong Kwon Bernard J Jansen Kam-Fai Wong and Meeyoung Cha. 2016. Detecting rumors from microblogs with recurrent neural networks. In IJCAI."},{"key":"e_1_3_2_1_28_1","unstructured":"Jing Ma Wei Gao and Kam-Fai Wong. 2018. Rumor detection on twitter with tree-structured recursive neural networks. ACL."},{"key":"e_1_3_2_1_29_1","volume-title":"Curriculum learning for reinforcement learning domains: A framework and survey. JMLR","author":"Narvekar Sanmit","year":"2020","unstructured":"Sanmit Narvekar, Bei Peng, Matteo Leonetti, Jivko Sinapov, Matthew E Taylor, and Peter Stone. 2020. Curriculum learning for reinforcement learning domains: A framework and survey. JMLR (2020)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Dat Quoc Nguyen Thanh Vu and Anh Tuan Nguyen. 2020. BERTweet: A pretrained language model for English Tweets. In EMNLP.","DOI":"10.18653\/v1\/2020.emnlp-demos.2"},{"key":"e_1_3_2_1_31_1","volume-title":"Fang: Leveraging social context for fake news detection using graph representation. In CIKM.","author":"Nguyen Van-Hoang","year":"2020","unstructured":"Van-Hoang Nguyen, Kazunari Sugiyama, Preslav Nakov, and Min-Yen Kan. 2020. Fang: Leveraging social context for fake news detection using graph representation. In CIKM."},{"key":"e_1_3_2_1_32_1","volume-title":"Content based fake news detection using knowledge graphs","author":"Pan Jeff Z","unstructured":"Jeff Z Pan, Siyana Pavlova, Chenxi Li, Ningxi Li, Yangmei Li, and Jinshuo Liu. 2018. Content based fake news detection using knowledge graphs. In ISWC. Springer."},{"key":"e_1_3_2_1_33_1","unstructured":"Adam Paszke Sam Gross Francisco Massa Adam Lerer James Bradbury Gregory Chanan Trevor Killeen Zeming Lin Natalia Gimelshein Luca Antiga et al. 2019. PyTorch: An Imperative Style High-Performance Deep Learning Library. In NeurIPS."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Kellin Pelrine Jacob Danovitch and Reihaneh Rabbany. 2021. The Surprising Performance of Simple Baselines for Misinformation Detection. In WWW.","DOI":"10.1145\/3442381.3450111"},{"key":"e_1_3_2_1_35_1","volume-title":"Efficient training of artificial neural networks for autonomous navigation. Neural computation 3, 1","author":"Pomerleau Dean A","year":"1991","unstructured":"Dean A Pomerleau. 1991. Efficient training of artificial neural networks for autonomous navigation. Neural computation 3, 1 (1991), 88--97."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Kashyap Popat Subhabrata Mukherjee Andrew Yates and Gerhard Weikum. 2018. DeClarE: Debunking Fake News and False Claims using Evidence-Aware Deep Learning. In EMNLP.","DOI":"10.18653\/v1\/D18-1003"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41599-019-0279-9"},{"key":"e_1_3_2_1_38_1","volume-title":"Csi: A hybrid deep model for fake news detection. In CIKM.","author":"Ruchansky Natali","year":"2017","unstructured":"Natali Ruchansky, Sungyong Seo, and Yan Liu. 2017. Csi: A hybrid deep model for fake news detection. In CIKM."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Kai Shu Limeng Cui Suhang Wang Dongwon Lee and Huan Liu. 2019. defend: Explainable fake news detection. In KDD.","DOI":"10.1145\/3292500.3330935"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0062"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Kai Shu Xinyi Zhou Suhang Wang Reza Zafarani and Huan Liu. 2019. The role of user profiles for fake news detection. In ASNAM.","DOI":"10.1145\/3341161.3342927"},{"key":"e_1_3_2_1_42_1","volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","unstructured":"Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction. MIT press."},{"key":"e_1_3_2_1_43_1","volume-title":"The spread of true and false news online. Science 359, 6380","author":"Vosoughi Soroush","year":"2018","unstructured":"Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false news online. Science 359, 6380 (2018), 1146--1151."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Xiting Wang Kunpeng Liu Dongjie Wang Le Wu Yanjie Fu and Xing Xie. 2022. Multi-level Recommendation Reasoning over Knowledge Graphs with Reinforcement Learning. In WWW. 2098--2108.","DOI":"10.1145\/3485447.3512083"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219903"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Yaqing Wang Fenglong Ma Haoyu Wang Kishlay Jha and Jing Gao. 2021. Multimodal Emergent Fake News Detection via Meta Neural Process Networks. In KDD.","DOI":"10.1145\/3447548.3467153"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Chenyan Xiong Zhuyun Dai Jamie Callan Zhiyuan Liu and Russell Power. 2017. End-to-end neural ad-hoc ranking with kernel pooling. In SIGIR.","DOI":"10.1145\/3077136.3080809"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Weizhi Xu JunfeiWu Qiang Liu ShuWu and LiangWang. 2022. Evidence-aware Fake News Detection with Graph Neural Networks. In WWW. 2501--2510.","DOI":"10.1145\/3485447.3512122"},{"key":"e_1_3_2_1_49_1","unstructured":"Weizhi Xu Junfei Wu Qiang Liu Shu Wu and Liang Wang. 2022. Mining Finegrained Semantics via Graph Neural Networks for Evidence-based Fake News Detection. WWW."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Fan Yang Yang Liu Xiaohui Yu and Min Yang. 2012. Automatic detection of rumor on sina weibo. In KDD.","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Chunyuan Yuan Qianwen Ma Wei Zhou Jizhong Han and Songlin Hu. 2019. Jointly embedding the local and global relations of heterogeneous graph for rumor detection. In ICDM.","DOI":"10.1109\/ICDM.2019.00090"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Kangzhi Zhao Xiting Wang Yuren Zhang Li Zhao Zheng Liu Chunxiao Xing and Xing Xie. 2020. Leveraging demonstrations for reinforcement recommendation reasoning over knowledge graphs. In SIGIR. 239--248.","DOI":"10.1145\/3397271.3401171"},{"key":"e_1_3_2_1_53_1","unstructured":"Cheng Zheng Bo Zong Wei Cheng Dongjin Song Jingchao Ni Wenchao Yu Haifeng Chen and Wei Wang. 2020. Robust graph representation learning via neural sparsification. In ICML."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Xinyi Zhou and Reza Zafarani. 2019. Network-based fake news detection: A pattern-driven approach. In KDD.","DOI":"10.1145\/3373464.3373473"}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539277","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:59Z","timestamp":1750186799000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":54,"alternative-id":["10.1145\/3534678.3539277","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539277","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}