{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T05:38:31Z","timestamp":1767850711350,"version":"3.49.0"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2025,4,30]]},"abstract":"<jats:p>\n            Social media users are more likely to be exposed to similar views and tend to avoid contrasting views, especially when they are part of a community of social media users. In this study, we investigate the presence of user communities and leverage them as a tool to detect misinformation on social media, specifically on X (formerly known as Twitter). We propose a misinformation detection framework, namely Similarity-based Misinformation Detection (SiMiD) that employs microblogs and utilizes user-follower interactions within a social network. Our approach extracts important textual features of social media posts using a transformer-based language model. We use contrastive learning and pseudo-labeling to fine-tune the language model. Then, we measure the similarity for each social media post based on its relevance to each user in the communities. Finally, we train a machine learning model to identify the truthfulness of social media posts using these similarity scores. We evaluate our approach on three social media datasets, compare our method with twelve state-of-the-art approaches, and answer five research questions. The experimental results, supported by statistical tests, show that contrastive learning and user communities can enhance the detection of misinformation on social media. Our model can identify misinformation content by achieving a consistently high weighted F1 score of over 90% across all datasets, even employing only a small number of users in communities. We make our implementations publicly available and provide all details that are necessary for the reproducibility of experiments.\n            <jats:xref ref-type=\"fn\">\n              <jats:sup>1<\/jats:sup>\n            <\/jats:xref>\n          <\/jats:p>","DOI":"10.1145\/3709009","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T15:56:07Z","timestamp":1734623767000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Misinformation on Social Media using Community Insights and Contrastive Learning"],"prefix":"10.1145","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9420-9854","authenticated-orcid":false,"given":"Oguzhan","family":"Ozcelik","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Bilkent University, Ankara, Turkey and Aselsan Inc., Ankara, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6976-3258","authenticated-orcid":false,"given":"Cagri","family":"Toraman","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Middle East Technical University, Ankara, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0016-4278","authenticated-orcid":false,"given":"Fazli","family":"Can","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Bilkent University, Ankara, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110642"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v3i1.13937"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1177\/0267323118760317"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5393"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-73510-5"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1423"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3532851"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1038\/s44159-021-00006-y"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2005.06.042"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3393880"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2018.8508408"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.100"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3463001"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.nlpcovid19-2.11"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00696-x"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.4269\/ajtmh.20-0812"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397741"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3369026"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168344"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1108\/JRIM-12-2020-0253"},{"key":"e_1_3_2_27_2","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive NLP tasks","volume":"33","author":"Lewis Patrick","year":"2020","unstructured":"Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich K\u00fcttler, Mike Lewis, Wen-tau Yih, Tim Rockt\u00e4schel, et\u00a0al.. 2020. Retrieval-augmented generation for knowledge-intensive NLP tasks. In Proceedings of the International Conference on Neural Information Processing Systems, Vol. 33, Curran Associates, Inc., 9459\u20139474.","journal-title":"Proceedings of the International Conference on Neural Information Processing Systems"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11065-x"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806651"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.48"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557477"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.5555\/3061053.3061153"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1066"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcps.2014.11.006"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.3390\/app11125390"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129329"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.2"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1974.tb00367.x"},{"key":"e_1_3_2_40_2","volume-title":"Misinformation Detection by Leveraging User Communities on Social Media","author":"Ozcelik Oguzhan","year":"2024","unstructured":"Oguzhan Ozcelik. 2024. Misinformation Detection by Leveraging User Communities on Social Media. Master\u2019s thesis. Computer Engineering Department, Bilkent University. Retrieved from https:\/\/repository.bilkent.edu.tr\/items\/a03562dd-e95c-4523-9b31-003cdec31579"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/SNAMS60348.2023.10375480"},{"key":"e_1_3_2_42_2","first-page":"549","volume-title":"Proceedings of the 4th Conference on Language, Data and Knowledge","author":"Ozcelik Oguzhan","year":"2023","unstructured":"Oguzhan Ozcelik, Arda Sarp Yenicesu, Onur Yildirim, Dilruba Sultan Haliloglu, Erdem Ege Eroglu, and Fazli Can. 2023. Cross-lingual transfer learning for misinformation detection: Investigating performance across multiple languages. In Proceedings of the 4th Conference on Language, Data and Knowledge. NOVA CLUNL, 549\u2013558."},{"key":"e_1_3_2_43_2","volume-title":"The Filter Bubble: What the Internet Is Hiding from You","author":"Pariser Eli","year":"2011","unstructured":"Eli Pariser. 2011. The Filter Bubble: What the Internet Is Hiding from You. The Penguin Group."},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450111"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.3201\/eid1002.030750"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2018.11.001"},{"issue":"1","key":"e_1_3_2_47_2","first-page":"140","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel Colin","year":"2020","unstructured":"Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J. Liu. 2020. Exploring the limits of transfer learning with a unified text-to-text transformer. The Journal of Machine Learning Research 21, 1 (Jan. 2020), Article 140, 67 pages.","journal-title":"The Journal of Machine Learning Research"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1410"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2016.04.003"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132877"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330935"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0062"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511999"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5501"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.naacl-main.364"},{"key":"e_1_3_2_56_2","first-page":"11283","volume-title":"Proceedings of the Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024)","author":"Toraman Cagri","year":"2024","unstructured":"Cagri Toraman, Oguzhan Ozcelik, Furkan \u015eahinu\u00e7, and Fazli Can. 2024. MiDe22: An annotated multi-event tweet dataset for misinformation detection. In Proceedings of the Joint International Conference on Computational Linguistics, Language Resources and Evaluation (LREC-COLING 2024). ELRA and ICCL, 11283\u201311295."},{"key":"e_1_3_2_57_2","first-page":"722","volume-title":"Proceedings of the Conference and Labs of the Evaluation Forum (CLEF \u201922)","author":"Toraman Cagri","year":"2022","unstructured":"Cagri Toraman, Oguzhan Ozcelik, Furkan \u015eahinu\u00e7, and Umitcan Sahin. 2022. ARC-NLP at CheckThat! 2022: Contradiction for harmful tweet detection. In Proceedings of the Conference and Labs of the Evaluation Forum (CLEF \u201922), 722\u2013739."},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1517441113"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_3_2_62_2","volume-title":"Proceedings of the 12th ACM International Conference on Web Search and Data Mining (WSDM-2019) (in Fake News Classification Challenge, WSDM Cup 2019)","author":"Yang K.-C.","year":"2019","unstructured":"K.-C. Yang, T. Niven, and Hung-Yu Kao. 2019. Fake news detection as natural language inference. In Proceedings of the 12th ACM International Conference on Web Search and Data Mining (WSDM-2019) (in Fake News Classification Challenge, WSDM Cup 2019)."},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.286"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(20)30461-X"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412880"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47436-2_27"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395046"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0150989"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709009","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3709009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4,30]]}},"alternative-id":["10.1145\/3709009"],"URL":"https:\/\/doi.org\/10.1145\/3709009","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,17]]},"assertion":[{"value":"2024-03-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}