{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T01:10:26Z","timestamp":1755825026146,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306098"],"award-info":[{"award-number":["62306098"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Project of Anhui Provincial Key Laboratory of Multimodal Cognitive Computation, Anhui University","award":["MMC202412"],"award-info":[{"award-number":["MMC202412"]}]},{"DOI":"10.13039\/501100006374","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JZ2024HGTB0256"],"award-info":[{"award-number":["JZ2024HGTB0256"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3731715.3733418","type":"proceedings-article","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:31:39Z","timestamp":1750876299000},"page":"1201-1210","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["RATE: Robust Adversarial Training and Temperature-scaled Ensemble Framework for Trustworthy Misinformation Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4275-6749","authenticated-orcid":false,"given":"Rui","family":"Sun","sequence":"first","affiliation":[{"name":"Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0639-2012","authenticated-orcid":false,"given":"Wenbo","family":"Hu","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9233-3827","authenticated-orcid":false,"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Automation, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5461-3986","authenticated-orcid":false,"given":"Richang","family":"Hong","sequence":"additional","affiliation":[{"name":"Hefei University of Technology, Hefei, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(02)00021-3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.01.072"},{"key":"e_1_3_2_1_3_1","unstructured":"Tian Bian Xi Xiao Tingyang Xu Peilin Zhao Wenbing Huang Yu Rong and Junzhou Huang. 2020. Rumor Detection on Social Media with Bi-Directional Graph Convolutional Networks. http:\/\/arxiv.org\/abs\/2001.06362 arXiv:2001.06362 [cs]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.035"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511968"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i1.27757"},{"key":"e_1_3_2_1_8_1","first-page":"17164","article-title":"Calibrated reliable regression using maximum mean discrepancy","volume":"33","author":"Cui Peng","year":"2020","unstructured":"Peng Cui, Wenbo Hu, and Jun Zhu. 2020. Calibrated reliable regression using maximum mean discrepancy. Advances in Neural Information Processing Systems, Vol. 33 (2020), 17164--17175.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19--1423"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462990"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of The 33rd International Conference on Machine Learning. PMLR, 1050--1059","author":"Gal Yarin","year":"2016","unstructured":"Yarin Gal and Zoubin Ghahramani. 2016. Dropout as a Bayesian Approximation: Representing Model Uncertainty in Deep Learning. In Proceedings of The 33rd International Conference on Machine Learning. PMLR, 1050--1059. https:\/\/proceedings.mlr.press\/v48\/gal16.html ISSN: 1938--7228."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adapen.2023.100142"},{"key":"e_1_3_2_1_13_1","volume-title":"RP-DNN: A Tweet level propagation context based deep neural networks for early rumor detection in Social Media. arxiv","author":"Gao Jie","year":"2002","unstructured":"Jie Gao, Sooji Han, Xingyi Song, and Fabio Ciravegna. 2020. RP-DNN: A Tweet level propagation context based deep neural networks for early rumor detection in Social Media. arxiv: 2002.12683 [cs.SI] https:\/\/arxiv.org\/abs\/2002.12683"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. https:\/\/doi.org\/10.48550\/arXiv.1412.6572 arXiv:1412.6572 [stat].","DOI":"10.48550\/arXiv.1412.6572"},{"key":"e_1_3_2_1_15_1","unstructured":"Chuan Guo Geoff Pleiss Yu Sun and Kilian Q Weinberger. [n. d.]. On Calibration of Modern Neural Networks. ( [n. d.])."},{"key":"e_1_3_2_1_16_1","volume-title":"Deberta: Decoding-enhanced bert with disentangled attention. arXiv preprint arXiv:2006.03654","author":"He Pengcheng","year":"2020","unstructured":"Pengcheng He, Xiaodong Liu, Jianfeng Gao, and Weizhu Chen. 2020. Deberta: Decoding-enhanced bert with disentangled attention. arXiv preprint arXiv:2006.03654 (2020)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i20.30214"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Beizhe Hu Qiang Sheng Juan Cao Yongchun Zhu Danding Wang Zhengjia Wang and Zhiwei Jin. 2023. Learn over Past Evolve for Future: Forecasting Temporal Trends for Fake News Detection. https:\/\/doi.org\/10.48550\/arXiv.2306.14728 arXiv:2306.14728 [cs].","DOI":"10.48550\/arXiv.2306.14728"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2025.3552658"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123454"},{"key":"e_1_3_2_1_21_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)."},{"key":"e_1_3_2_1_22_1","volume-title":"Kipf and Max Welling","author":"Thomas","year":"2017","unstructured":"Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. arxiv: 1609.02907 [cs.LG] https:\/\/arxiv.org\/abs\/1609.02907"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning. PMLR, 2805--2814","author":"Kumar Aviral","year":"2018","unstructured":"Aviral Kumar, Sunita Sarawagi, and Ujjwal Jain. 2018. Trainable Calibration Measures for Neural Networks from Kernel Mean Embeddings. In Proceedings of the 35th International Conference on Machine Learning. PMLR, 2805--2814. https:\/\/proceedings.mlr.press\/v80\/kumar18a.html ISSN: 2640--3498."},{"key":"e_1_3_2_1_24_1","unstructured":"Balaji Lakshminarayanan Alexander Pritzel and Charles Blundell. 2017. Simple and Scalable Predictive Uncertainty Estimation using Deep Ensembles. http:\/\/arxiv.org\/abs\/1612.01474 arXiv:1612.01474 [stat]."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jcim.4c01139"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/S19--2148"},{"key":"e_1_3_2_1_27_1","volume-title":"Grid search, random search, genetic algorithm: a big comparison for NAS. arXiv preprint arXiv:1912.06059","author":"Liashchynskyi Petro","year":"2019","unstructured":"Petro Liashchynskyi and Pavlo Liashchynskyi. 2019. Grid search, random search, genetic algorithm: a big comparison for NAS. arXiv preprint arXiv:1912.06059 (2019)."},{"key":"e_1_3_2_1_28_1","unstructured":"Tsung-Yi Lin Priya Goyal Ross Girshick Kaiming He and Piotr Dollar. [n. d.]. Focal Loss for Dense Object Detection. ( [n. d.])."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468507.3468519"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681089"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806651"},{"key":"e_1_3_2_1_32_1","volume-title":"Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. Roberta: A robustly optimized bert pretraining approach. arXiv preprint arXiv:1907.11692 (2019)."},{"key":"e_1_3_2_1_33_1","unstructured":"Jing Ma Wei Gao Prasenjit Mitra Sejeong Kwon Bernard J Jansen Kam-Fai Wong and Meeyoung Cha. [n. d.]. Detecting rumors from microblogs with recurrent neural networks. ( [n. d.])."},{"key":"e_1_3_2_1_34_1","unstructured":"Jing Ma Wei Gao Prasenjit Mitra Sejeong Kwon Bernard J Jansen Kam-Fai Wong and Meeyoung Cha. 2016. Detecting rumors from microblogs with recurrent neural networks. (2016)."},{"volume-title":"Detect rumors in microblog posts using propagation structure via kernel learning","author":"Ma Jing","key":"e_1_3_2_1_35_1","unstructured":"Jing Ma, Wei Gao, and Kam-Fai Wong. 2017. Detect rumors in microblog posts using propagation structure via kernel learning. Association for Computational Linguistics."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/6648970"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605943"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512163"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1902.06673"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-021-00873-8"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412046"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-023-01902-w"},{"key":"e_1_3_2_1_43_1","volume-title":"Adv. Large Margin Classif.","volume":"10","author":"Platt John","year":"2000","unstructured":"John Platt. 2000. Probabilistic Outputs for Support Vector Machines and Comparisons to Regularized Likelihood Methods. Adv. Large Margin Classif., Vol. 10 (June 2000)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"Kashyap Popat Subhabrata Mukherjee Andrew Yates and Gerhard Weikum. 2018. DeClarE: Debunking Fake News and False Claims using Evidence-Aware Deep Learning. https:\/\/doi.org\/10.48550\/arXiv.1809.06416 arXiv:1809.06416 [cs].","DOI":"10.48550\/arXiv.1809.06416"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3481548"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1317"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","unstructured":"Thaer Sahmoud and Mohammad Mikki. 2022. Spam Detection Using BERT. https:\/\/doi.org\/10.48550\/arXiv.2206.02443 arXiv:2206.02443 [cs].","DOI":"10.48550\/arXiv.2206.02443"},{"key":"e_1_3_2_1_48_1","volume-title":"Exploiting cloze questions for few shot text classification and natural language inference. arXiv preprint arXiv:2001.07676","author":"Schick Timo","year":"2020","unstructured":"Timo Schick and Hinrich Sch\u00fctze. 2020. Exploiting cloze questions for few shot text classification and natural language inference. arXiv preprint arXiv:2001.07676 (2020)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.311"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330935"},{"key":"e_1_3_2_1_51_1","volume-title":"Fakenewsnet: A data repository with news content, social context, and spatiotemporal information for studying fake news on social media. Big data","author":"Shu Kai","year":"2020","unstructured":"Kai Shu, Deepak Mahudeswaran, Suhang Wang, Dongwon Lee, and Huan Liu. 2020. Fakenewsnet: A data repository with news content, social context, and spatiotemporal information for studying fake news on social media. Big data, Vol. 8, 3 (2020), 171--188."},{"key":"e_1_3_2_1_52_1","volume-title":"Making Strides Security in Multimodal Fake News Detection Models: A Comprehensive Analysis of Adversarial Attacks. In International Conference on Multimedia Modeling. Springer, 296--309","author":"Si Jiahua","year":"2024","unstructured":"Jiahua Si, Youze Wang, Wenbo Hu, Qiang Liu, and Richang Hong. 2024. Making Strides Security in Multimodal Fake News Detection Models: A Comprehensive Analysis of Adversarial Attacks. In International Conference on Multimedia Modeling. Springer, 296--309."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20385"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511999"},{"key":"e_1_3_2_1_55_1","volume-title":"2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS). IEEE, 1--6.","author":"Swapna H","year":"2022","unstructured":"H Swapna and B Soniya. 2022. A review on news-content based fake news detection approaches. In 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS). IEEE, 1--6."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Christian Szegedy Vincent Vanhoucke Sergey Ioffe Jon Shlens and Zbigniew Wojna. 2016. Rethinking the Inception Architecture for Computer Vision. 2818--2826. https:\/\/www.cv-foundation.org\/openaccess\/content_cvpr_2016\/html\/Szegedy_Rethinking_the_Inception_CVPR_2016_paper.html","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_1_57_1","volume-title":"Graph attention networks. arXiv preprint arXiv:1710.10903","author":"Veli\u010dkovi\u0107 Petar","year":"2017","unstructured":"Petar Veli\u010dkovi\u0107, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2017. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2606428"},{"key":"e_1_3_2_1_59_1","unstructured":"Douglas Brent West et al. 2001. Introduction to graph theory. Vol. 2. Prentice hall Upper Saddle River."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671977"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599298"},{"key":"e_1_3_2_1_62_1","volume-title":"Unsupervised data augmentation for consistency training. Advances in neural information processing systems","author":"Xie Qizhe","year":"2020","unstructured":"Qizhe Xie, Zihang Dai, Eduard Hovy, Thang Luong, and Quoc Le. 2020. Unsupervised data augmentation for consistency training. Advances in neural information processing systems, Vol. 33 (2020), 6256--6268."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539277"},{"key":"e_1_3_2_1_64_1","volume-title":"Yu","author":"Yang Yang","year":"2023","unstructured":"Yang Yang, Lei Zheng, Jiawei Zhang, Qingcai Cui, Zhoujun Li, and Philip S. Yu. 2023. TI-CNN: Convolutional Neural Networks for Fake News Detection. arxiv: 1806.00749 [cs.CL] https:\/\/arxiv.org\/abs\/1806.00749"},{"key":"e_1_3_2_1_65_1","unstructured":"Peican Zhu Zechen Pan Yang Liu Jiwei Tian Keke Tang and Zhen Wang. 2024. A General Black-box Adversarial Attack on Graph-based Fake News Detectors. arxiv: 2404.15744 [cs.LG] https:\/\/arxiv.org\/abs\/2404.15744"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531816"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3185151"}],"event":{"name":"ICMR '25: International Conference on Multimedia Retrieval","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Chicago IL USA","acronym":"ICMR '25"},"container-title":["Proceedings of the 2025 International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3731715.3733418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T04:14:39Z","timestamp":1755749679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3731715.3733418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":67,"alternative-id":["10.1145\/3731715.3733418","10.1145\/3731715"],"URL":"https:\/\/doi.org\/10.1145\/3731715.3733418","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}