{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:27:33Z","timestamp":1761719253479,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Social Science Foundation of China","award":["20BXW101"],"award-info":[{"award-number":["20BXW101"]}]},{"name":"Top-notch Talents of the Discipline","award":["ZZKY2022303"],"award-info":[{"award-number":["ZZKY2022303"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1145\/3627341.3630379","type":"proceedings-article","created":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T12:07:01Z","timestamp":1702642021000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on Interpretable Fake News Detection Technology Based on Co-Attention Mechanism"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4809-2377","authenticated-orcid":false,"given":"Wen","family":"Jiang","sequence":"first","affiliation":[{"name":"Armed Police Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4800-5938","authenticated-orcid":false,"given":"Mingshu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Network and Information Security of Armed Police Force, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0856-7813","authenticated-orcid":false,"given":"Bin","family":"Wei","sequence":"additional","affiliation":[{"name":"Key Laboratory of Network and Information Security of Armed Police Force, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4134-5302","authenticated-orcid":false,"given":"Kelan","family":"Ren","sequence":"additional","affiliation":[{"name":"Armed Police Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5941-2251","authenticated-orcid":false,"given":"Facheng","family":"Yan","sequence":"additional","affiliation":[{"name":"Armed Police Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1697-8738","authenticated-orcid":false,"given":"Xiong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Armed Police Engineering University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"153","volume-title":"Fake News Detection Based on Joint Training Two-Branch Network. (Computer Engineering and Applications)","author":"Guo L N","unstructured":"Guo L N, Huang J, Wu X C, 2022, Fake News Detection Based on Joint Training Two-Branch Network. (Computer Engineering and Applications) p 153-161"},{"key":"e_1_3_2_1_2_1","first-page":"675","volume-title":"Information credibility on Twitter (Proceedings of the 20th International Conference on World Wide Web)","author":"Castillo C","unstructured":"Castillo C, Mendoza M, Poblete B. 2011, Information credibility on Twitter (Proceedings of the 20th International Conference on World Wide Web) p 675-684"},{"key":"e_1_3_2_1_3_1","first-page":"240","volume-title":"A Stylometric Inquiry into Hyperpartisan and Fake News. (In\u00a0Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics)","author":"Potthast M","unstructured":"Potthast M, Kiesel J, Reinartz K, 2017, A Stylometric Inquiry into Hyperpartisan and Fake News. (In\u00a0Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics) p 231\u2013240"},{"doi-asserted-by":"crossref","unstructured":"Ruchansky N Seo S Liu Y. 2017 CSI:A Hybrid Deep Model for Fake News Detection. (Proceedings of the 2017 ACM on Conference on Information and Knowledge Management) p 797-804","key":"e_1_3_2_1_4_1","DOI":"10.1145\/3132847.3132877"},{"key":"e_1_3_2_1_5_1","first-page":"591","volume-title":"What is Twitter, a social network or a news media? (Proc International Conference on World Wide Web)","author":"Kwak H","unstructured":"Kwak H, Lee C, Park H, 2010, What is Twitter, a social network or a news media? (Proc International Conference on World Wide Web) p 591-600"},{"key":"e_1_3_2_1_6_1","first-page":"505","volume-title":"GCAN: Graph-aware Co-Attention Networks for Explainable Fake News Detection on Social Media (In\u00a0Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics)","author":"Lu Y J","year":"2020","unstructured":"Lu Y J, Li C T. 2020, GCAN: Graph-aware Co-Attention Networks for Explainable Fake News Detection on Social Media (In\u00a0Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics) p 505-514"},{"key":"e_1_3_2_1_7_1","first-page":"2961","volume-title":"dEFEND: A System for Explainable Fake News Detection (Conference on Information and Knowledge Management","author":"Shu K","unstructured":"Shu K, Cui L, Wang S, 2019, dEFEND: A System for Explainable Fake News Detection (Conference on Information and Knowledge Management. Association for Computing Machinery) p 2961-2964"},{"key":"e_1_3_2_1_8_1","first-page":"170","volume-title":"Chinese Text Classification Model Based on Improved TF-IDF and ABLCNN (Computer Science) vol 48","author":"Jing L","unstructured":"Jing L, He T T.2021, Chinese Text Classification Model Based on Improved TF-IDF and ABLCNN (Computer Science) vol 48 p170-175"},{"key":"e_1_3_2_1_9_1","first-page":"33","volume-title":"Survey on N-gram Model (Computer Systems and Applications) vol 27","author":"Yin C","unstructured":"Yin C, Wu M.2018, Survey on N-gram Model (Computer Systems and Applications) vol 27 p 33-38"},{"key":"e_1_3_2_1_10_1","first-page":"2303","volume-title":"Chinese text Sentiment Analysis based on ELMO and Bi-SAN (Application Research of Computers) vol 38","author":"Li Z","unstructured":"Li Z, Chen L, Zhang S. 2021, Chinese text Sentiment Analysis based on ELMO and Bi-SAN (Application Research of Computers) vol 38 p 2303-2307"},{"key":"e_1_3_2_1_11_1","first-page":"12","volume-title":"Review of Pre-training Models for Natural Language Processing (Computer Engineering and Applications) vol 56","author":"Yu T R","unstructured":"Yu T R, Jin R, Han X Z, 2020, Review of Pre-training Models for Natural Language Processing (Computer Engineering and Applications) vol 56 p12-22"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"Social Network Information Diffusion Prediction Based on Spatial-Temporal Transformer (Journal of Computer Research and Development)","author":"Fan W","unstructured":"Fan W, Liu Y. 2022, Social Network Information Diffusion Prediction Based on Spatial-Temporal Transformer (Journal of Computer Research and Development) p 1-12"},{"key":"e_1_3_2_1_13_1","first-page":"137","volume-title":"Fake news text detection based on Bert pre-training model (Information Technology)","author":"Wang G T","unstructured":"Wang G T, Dong J J, Gao Y, 2022, Fake news text detection based on Bert pre-training model (Information Technology) p 137-142"},{"unstructured":"Z Zhang M Sabuncu.2018 Generalized cross entropy loss for training deep neural networks with noisy labels (Part of Advances in Neural Information Processing Systems 31 (NeurIPS 2018) vol 4 p26-29","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"1","volume-title":"A review of research on the interpretability of deep learning models (Computer Engineering and Applications) vol 57","author":"Zeng C Y","unstructured":"Zeng C Y, Yan K, Wang Z F, 2021, A review of research on the interpretability of deep learning models (Computer Engineering and Applications) vol 57 p 1-9"},{"volume-title":"Intrusion Detection Method Based on Borderline-SMOTE and Double Attention (Computer Science) vol 48","unstructured":"LIU Q M, LI Y N, GUO T, 2021, Intrusion Detection Method Based on Borderline-SMOTE and Double Attention (Computer Science) vol 48 p 327-332","first-page":"327","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Detection Methods, and Opportunities (ACM Computing Surveys) vol 53","author":"Xinyi Zhou 0.","unstructured":"Xinyi Zhou, Reza Zafarani.2020. A Survey of Fake News: Fundamental Theories, Detection Methods, and Opportunities (ACM Computing Surveys) vol 53 p1-40"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/3219819.3219903"},{"key":"e_1_3_2_1_19_1","first-page":"68","volume-title":"Improve the pertinence and effectiveness of the response to the current negative public opinion related to the military (Political Work Journal)","author":"Tong Z.","unstructured":"Tong Z. 2020, Improve the pertinence and effectiveness of the response to the current negative public opinion related to the military (Political Work Journal) p 68-70"},{"key":"e_1_3_2_1_20_1","first-page":"2278","volume-title":"Gradient-based learning applied to document recognition (Proceedings of the IEEE) vol 86","author":"LeCun Y","unstructured":"LeCun Y, Bottou L, Bengio Y, 1998, Gradient-based learning applied to document recognition (Proceedings of the IEEE) vol 86 p 2278-2324"},{"key":"e_1_3_2_1_21_1","first-page":"9049","volume-title":"Automating fake news detection system using multi-level voting model (Soft Computing) vol 24","author":"Sawinder Kaur 0","unstructured":"Sawinder Kaur, Parteek Kumar.2020, Automating fake news detection system using multi-level voting model (Soft Computing) vol 24 p 9049-9069"},{"key":"e_1_3_2_1_22_1","first-page":"48","volume-title":"A review on the attention mechanism of deep learning (Neurocomputing)vol 452","author":"Niu Z Y","unstructured":"Niu Z Y, Zhong G Q, Yu H.2021, A review on the attention mechanism of deep learning (Neurocomputing)vol 452 p48-62"},{"key":"e_1_3_2_1_23_1","first-page":"10705","volume-title":"Attention Branch Network: Learning of Attention Mechanism for Visual Explanation (Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition)","author":"Hiroshi Fukui","year":"2019","unstructured":"Hiroshi Fukui, Tsubasa Hirakawa, Takayoshi Yamashita, 2019, Attention Branch Network: Learning of Attention Mechanism for Visual Explanation (Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition) p10705-10714"},{"key":"e_1_3_2_1_24_1","first-page":"432","volume-title":"An Introductory Survey on Attention Mechanisms in NLP Problems (Intelligent Systems and Applications) Vol 1038","author":"Hu D C","unstructured":"Hu D C.2019, An Introductory Survey on Attention Mechanisms in NLP Problems (Intelligent Systems and Applications) Vol 1038 p 432-448"},{"key":"e_1_3_2_1_25_1","first-page":"3818","volume-title":"Detecting rumors from microblogs with recurrent neural networks (IJCAI International Joint Conference on Artificial Intelligence)","author":"Ma J","unstructured":"Ma J, Gao W, Mitra P, 2016, Detecting rumors from microblogs with recurrent neural networks (IJCAI International Joint Conference on Artificial Intelligence) p 3818-3824"},{"key":"e_1_3_2_1_26_1","first-page":"3465","volume-title":"Mining dual emotion for fake news detection (Proceedings of the Web Conference)","author":"Zhang X","unstructured":"Zhang X, Cao J, Li X, 2021, Mining dual emotion for fake news detection (Proceedings of the Web Conference) p 3465-3476"},{"key":"e_1_3_2_1_27_1","first-page":"645","volume-title":"Survey of clustering algorithms","author":"Rui Xu D.","unstructured":"Rui Xu, D.Wunsch.2005, Survey of clustering algorithms (IEEE Transactions on Neural Networks) vol 16 p 645-678"},{"volume-title":"Unsupervised K-Means Clustering Algorithm","author":"Kristina P.","unstructured":"Kristina P.Sinaga, Miin-Shen Yang.2020, Unsupervised K-Means Clustering Algorithm(IEEE Access)vol 8 p80716-80727","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","first-page":"216","volume-title":"The impact of class imbalance in classification performance metrics based on the binary confusion matrix (Pattern Recognition) vol 91","author":"Amalia Luque","unstructured":"Amalia Luque, Alejandro Carrasco, Alejandro Martin, 2019, The impact of class imbalance in classification performance metrics based on the binary confusion matrix (Pattern Recognition) vol 91 p216-231"},{"key":"e_1_3_2_1_30_1","first-page":"772","volume-title":"Three-way confusion matrix for classification: A measure driven view (Information Sciences) vol 507","author":"Xu J F","unstructured":"Xu J F, Zhang Y J, Miao D Q.2020, Three-way confusion matrix for classification: A measure driven view (Information Sciences) vol 507 p772-794"},{"volume-title":"An Effective Diabetes Mellitus Classification Algorithm on Imbalanced Data with Missing Values","author":"Wang Q","unstructured":"Wang Q, Cao W J, Guo J W, 2019, DMP_MI: An Effective Diabetes Mellitus Classification Algorithm on Imbalanced Data with Missing Values (IEEE Access) vol 7 p102232-102238","key":"e_1_3_2_1_31_1"}],"event":{"acronym":"ICCVIT 2023","name":"ICCVIT 2023: International Conference on Computer, Vision and Intelligent Technology","location":"Chenzhou China"},"container-title":["Proceedings of the 2023 International Conference on Computer, Vision and Intelligent Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627341.3630379","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627341.3630379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:00:06Z","timestamp":1755900006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627341.3630379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":31,"alternative-id":["10.1145\/3627341.3630379","10.1145\/3627341"],"URL":"https:\/\/doi.org\/10.1145\/3627341.3630379","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]},"assertion":[{"value":"2023-12-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}