{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T10:30:59Z","timestamp":1758709859183,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"ASPIRE Award for Research Excellence","award":["AARE20-307"],"award-info":[{"award-number":["AARE20-307"]}]},{"name":"NYUAD CITIES","award":["CG00"],"award-info":[{"award-number":["CG00"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-21-CE23-0037"],"award-info":[{"award-number":["ANR-21-CE23-0037"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679781","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:21Z","timestamp":1729452861000},"page":"1627-1637","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Data Void Exploits: Tracking &amp; Mitigation Strategies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7738-1815","authenticated-orcid":false,"given":"Miro","family":"Mannino","sequence":"first","affiliation":[{"name":"NYU Abu Dhabi, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7880-4274","authenticated-orcid":false,"given":"Junior","family":"Garcia","sequence":"additional","affiliation":[{"name":"NYU Abu Dhabi, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3824-7265","authenticated-orcid":false,"given":"Reem","family":"Hazim","sequence":"additional","affiliation":[{"name":"NYU Abu Dhabi, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4273-2536","authenticated-orcid":false,"given":"Azza","family":"Abouzied","sequence":"additional","affiliation":[{"name":"NYU Abu Dhabi, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0651-4128","authenticated-orcid":false,"given":"Paolo","family":"Papotti","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19437-5_23"},{"key":"e_1_3_2_1_2_1","volume-title":"Dissecting the #PizzaGate Conspiracy Theories. The New York Times (10","author":"Aisch Gregor","year":"2016","unstructured":"Gregor Aisch, Jon Huang, and Cecilia Kang. 2016. Dissecting the #PizzaGate Conspiracy Theories. The New York Times (10 Dec 2016). https:\/\/www.nytimes.com\/interactive\/2016\/12\/10\/business\/media\/pizzagate.html"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Adrien Barbaresi. 2021. Trafilatura: A Web Scraping Library and Command-Line Tool for Text Discovery and Extraction. In Proceedings of the Joint Conference of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing: System Demonstrations. Association for Computational Linguistics 122--131. https:\/\/aclanthology.org\/2021.acl-demo.15","DOI":"10.18653\/v1\/2021.acl-demo.15"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607220"},{"key":"e_1_3_2_1_6_1","volume-title":"Investigator: DNC Was \"Directly Involved\" in Iowa Caucus App Development, Countering DNC Denial. The Intercept","author":"Chariton Jordan","year":"2020","unstructured":"Jordan Chariton. 2020. Investigator: DNC Was \"Directly Involved\" in Iowa Caucus App Development, Countering DNC Denial. The Intercept (2020). https:\/\/theintercept.com\/2020\/12\/23\/dnc-iowa-caucus-app-shadow\/ Accessed: 2024-01--15."},{"key":"e_1_3_2_1_7_1","volume-title":"Friedman","author":"Cheng Alice","year":"2006","unstructured":"Alice Cheng and Eric J. Friedman. 2006. Manipulability of PageRank under Sybil Strategies. https:\/\/api.semanticscholar.org\/CorpusID:14707993"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465297"},{"key":"e_1_3_2_1_9_1","unstructured":"Selenium Developers. 2023. selenium. https:\/\/pypi.org\/project\/selenium\/ Python package version 4.14.0."},{"key":"e_1_3_2_1_10_1","unstructured":"EC Rafiq Copeland Jenny Fan and Tanay Jaeel. 2020. Filling the Data Void. https:\/\/datavoids.2020.bkmla.org\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555616"},{"key":"e_1_3_2_1_13_1","unstructured":"Xiou Ge Yun-Cheng Wang Bin Wang and C. C. Jay Kuo. 2023. Knowledge Graph Embedding: An Overview. arxiv: 2309.12501 [cs.AI]"},{"key":"e_1_3_2_1_14_1","volume-title":"How Pizzagate went from fake news to a real problem for a D.C. business. PolitiFact","author":"Gillin Joshua","year":"2016","unstructured":"Joshua Gillin. 2016. How Pizzagate went from fake news to a real problem for a D.C. business. PolitiFact (2016). https:\/\/www.politifact.com\/article\/2016\/dec\/05\/how-pizzagate-went-fake-news-real-problem-dc-busin\/ Accessed: 2024-01--15."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2024. Google Custom Search JSON API Overview. https:\/\/developers.google.com\/custom-search\/v1\/overview"},{"key":"e_1_3_2_1_17_1","unstructured":"Google Blog. 2012. Introducing the Knowledge Graph: things not strings. https:\/\/blog.google\/products\/search\/introducing-knowledge-graph-things-not\/ Accessed on 2024-01--15."},{"key":"e_1_3_2_1_18_1","unstructured":"Google Support. 2024. The Knowledge Graph. https:\/\/support.google.com\/knowledgepanel\/answer\/9787176?hl=en-GB Accessed on 2024-01--15."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14962"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392854"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358036"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580846"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580846"},{"key":"e_1_3_2_1_24_1","volume-title":"Why the Far Right Is Obsessed with Sex Trafficking. Politico","author":"Kim Catherine","year":"2024","unstructured":"Catherine Kim. 2024. Pizzagate, QAnon, and the 'Epstein List': Why the Far Right Is Obsessed with Sex Trafficking. Politico (2024). https:\/\/www.politico.com\/news\/magazine\/2024\/01\/09\/why-maga-is-obsessed-with-jeffrey-epstein-00134394 Accessed: 2024-01--15."},{"key":"e_1_3_2_1_25_1","volume-title":"Where the 'Crisis Actor' Conspiracy Theory Comes From. Vice","author":"Koebler Jason","year":"2018","unstructured":"Jason Koebler. 2018. Where the 'Crisis Actor' Conspiracy Theory Comes From. Vice (2018). https:\/\/www.vice.com\/en\/article\/pammy8\/what-is-a-crisis-actor-conspiracy-theory-explanation-parkland-shooting-sandy-hook Accessed: 2024-01--15."},{"key":"e_1_3_2_1_26_1","volume-title":"Is Comet Ping Pong Pizzeria Home to a Child Abuse Ring Led by Hillary Clinton' Snopes","author":"LaCapria Kim","year":"2016","unstructured":"Kim LaCapria. 2016. Is Comet Ping Pong Pizzeria Home to a Child Abuse Ring Led by Hillary Clinton' Snopes (2016). https:\/\/www.snopes.com\/fact-check\/pizzagate-conspiracy\/ Accessed: 2024-01--15."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660332"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447535.3462479"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23657"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517221149099"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00108"},{"key":"e_1_3_2_1_33_1","volume-title":"Iowa autopsy report: DNC meddling led to caucus debacle. Politico","author":"Pager Tyler","year":"2020","unstructured":"Tyler Pager. 2020. Iowa autopsy report: DNC meddling led to caucus debacle. Politico (2020). https:\/\/www.politico.com\/news\/2020\/12\/12\/iowa-caucus-dnc-report-444649 Accessed: 2024-01--15."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1337"},{"key":"e_1_3_2_1_35_1","unstructured":"PostgreSQL. 2023. Text Search Ranking - PostgreSQL Documentation. https:\/\/www.postgresql.org\/docs\/current\/textsearch-controls.html#TEXTSEARCH-RANKING"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372879"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274417"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3517887"},{"key":"e_1_3_2_1_39_1","unstructured":"SEOMoz Inc. 2024. Moz URL Metrics. https:\/\/moz.com\/help\/links-api\/making-calls\/url-metrics"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207243.2207252"},{"volume-title":"The Propagandists' Playbook: How Conservative Elites Manipulate Search and Threaten Democracy","author":"Tripodi Francesca Bolla","key":"e_1_3_2_1_41_1","unstructured":"Francesca Bolla Tripodi. 2022. The Propagandists' Playbook: How Conservative Elites Manipulate Search and Threaten Democracy. Yale University Press, New Haven and London."},{"key":"e_1_3_2_1_42_1","unstructured":"Th\u00e9o Trouillon Johannes Welbl Sebastian Riedel \u00c9ric Gaussier and Guillaume Bouchard. 2016. Complex Embeddings for Simple Link Prediction. arxiv: 1606.06357 [cs.AI]"},{"key":"e_1_3_2_1_43_1","unstructured":"Matta Sree Vani and O. Yaswanth Babu. 2013. A Survey on Link Based Algorithms for Web Spam Detection. https:\/\/api.semanticscholar.org\/CorpusID:55491284"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2754499"},{"key":"e_1_3_2_1_45_1","volume-title":"Sandy Hook Hoax: The Power of Conspiracy Theories. NPR","author":"Williamson Elizabeth","year":"2022","unstructured":"Elizabeth Williamson. 2022. Sandy Hook Hoax: The Power of Conspiracy Theories. NPR (2022). https:\/\/www.npr.org\/2022\/03\/09\/1084912392\/sandy-hook-hoax-elizabeth-williamson Accessed on 2024-01--15."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501247.3531562"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Hengtong Zhang Tianhang Zheng Jing Gao Chenglin Miao Lu Su Yaliang Li and Kui Ren. 2019. Data Poisoning Attack against Knowledge Graph Embedding. (2019) 4853--4859. https:\/\/www.ijcai.org\/proceedings\/2019\/674","DOI":"10.24963\/ijcai.2019\/674"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Boise ID USA","acronym":"CIKM '24"},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:28Z","timestamp":1750294708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":45,"alternative-id":["10.1145\/3627673.3679781","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679781","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}