{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T11:46:45Z","timestamp":1765453605857,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,3]]},"DOI":"10.1145\/3748699.3749827","type":"proceedings-article","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T07:01:29Z","timestamp":1765350089000},"page":"478-483","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["GetGNN: Generative Text Graph Neural Networks for Robust Deception Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7043-4544","authenticated-orcid":false,"given":"Yong-Han","family":"Chen","sequence":"first","affiliation":[{"name":"National Cheng Kung University, Tainan, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7995-4787","authenticated-orcid":false,"given":"Cheng-Te","family":"Li","sequence":"additional","affiliation":[{"name":"National Cheng Kung University, Tainan, Tainan, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2025,12,9]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i1.27752"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Nitesh\u00a0V Chawla Kevin\u00a0W Bowyer Lawrence\u00a0O Hall and W\u00a0Philip Kegelmeyer. 2002. SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research 16 (2002) 321\u2013357.","DOI":"10.1613\/jair.953"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.617"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20314"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3481949"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3487351.3488336"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.196"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.eacl-main.232"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Qinglang Guo Haiyong Xie Yangyang Li Wen Ma and Chao Zhang. 2021. Social bots detection via fusing bert and graph convolutional networks. Symmetry 14 1 (2021) 30.","DOI":"10.3390\/sym14010030"},{"key":"e_1_3_3_2_11_2","volume-title":"WWW","author":"He Xiangnan","year":"2017","unstructured":"Xiangnan He, Lizi Liao, Hanwang Zhang, Liqiang Nie, Xia Hu, and Tat-Seng Chua. 2017. Neural Collaborative Filtering. In WWW."},{"key":"e_1_3_3_2_12_2","volume-title":"ICLR","author":"Kingma Diederik\u00a0P","year":"2015","unstructured":"Diederik\u00a0P Kingma and Jimmy Ba. 2015. Adam: A method for stochastic optimization. In ICLR."},{"key":"e_1_3_3_2_13_2","volume-title":"ICLR","author":"Kipf Thomas\u00a0N.","year":"2017","unstructured":"Thomas\u00a0N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Bo Li Peng Qi Bo Liu Shuai Di Jingen Liu Jiquan Pei Jinfeng Yi and Bowen Zhou. 2023. Trustworthy AI: From Principles to Practices. ACM Comput. Surv. 55 9 Article 177 (2023).","DOI":"10.1145\/3555803"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-4005"},{"key":"e_1_3_3_2_16_2","volume-title":"ICLR","author":"Liu Yinhan","year":"2020","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2020. Roberta: A robustly optimized bert pretraining approach. In ICLR."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.acl-main.48"},{"key":"e_1_3_3_2_18_2","volume-title":"WWW","author":"Lu Yen-Wen","year":"2024","unstructured":"Yen-Wen Lu, Yu-Che Tsai, and Cheng-Te Li. 2024. Burstiness-aware Bipartite Graph Neural Networks for Fraudulent User Detection on Rating Platforms. In WWW."},{"key":"e_1_3_3_2_19_2","volume-title":"ACL","author":"Ott Myle","year":"2011","unstructured":"Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey\u00a0T. Hancock. 2011. Finding Deceptive Opinion Spam by Any Stretch of the Imagination. In ACL."},{"key":"e_1_3_3_2_20_2","volume-title":"WWW","author":"Piao Jinghua","year":"2025","unstructured":"Jinghua Piao, Zhihong Lu, Chen Gao, and Yong Li. 2025. Social Bots Meet Large Language Model: Political Bias and Social Learning Inspired Mitigation Strategies. In WWW."},{"key":"e_1_3_3_2_21_2","unstructured":"Boyu Qiao Wei Zhou Kun Li Shilong Li and Songlin Hu. 2024. Dispelling the fake: Social bot detection based on edge confidence evaluation. IEEE TNNLS (2024)."},{"key":"e_1_3_3_2_22_2","volume-title":"CLEF","author":"Rangel Francisco","year":"2019","unstructured":"Francisco Rangel and Paolo Rosso. 2019. Overview of the 7th author profiling task at PAN 2019: bots and gender profiling in twitter. In CLEF."},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Yafeng Ren and Donghong Ji. 2019. Learning to detect deceptive opinion spam: A survey. IEEE Access 7 (2019) 42934\u201342945.","DOI":"10.1109\/ACCESS.2019.2908495"},{"key":"e_1_3_3_2_24_2","volume-title":"WWW","author":"Shi Shuhao","year":"2024","unstructured":"Shuhao Shi, Kai Qiao, Chen Chen, Jie Yang, Jian Chen, and Bin Yan. 2024. Over-sampling strategy in feature space for graphs based class-imbalanced bot detection. In WWW."},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Nenad Toma\u0161ev Julien Cornebise Frank Hutter Shakir Mohamed Angela Picciariello Bec Connelly Danielle\u00a0CM Belgrave Daphne Ezer Fanny Cachat van\u00a0der Haert Frank Mugisha et\u00a0al. 2020. AI for social good: unlocking the opportunity for positive impact. Nature Communications 11 1 (2020) 2468.","DOI":"10.1038\/s41467-020-15871-z"},{"key":"e_1_3_3_2_26_2","volume-title":"NeurIPS","author":"Wu Qitian","year":"2022","unstructured":"Qitian Wu, Wentao Zhao, Zenan Li, David\u00a0P Wipf, and Junchi Yan. 2022. Nodeformer: A scalable graph structure learning transformer for node classification. In NeurIPS."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Zonghan Wu Shirui Pan Fengwen Chen Guodong Long Chengqi Zhang and Philip\u00a0S. Yu. 2021. A Comprehensive Survey on Graph Neural Networks. IEEE TNNLS 32 1 (2021) 4\u201324.","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_3_2_28_2","volume-title":"WWW","author":"Yang Sheng-Fang","year":"2024","unstructured":"Sheng-Fang Yang and Cheng-Te Li. 2024. Detecting Illicit Food Factories from Chemical Declaration Data via Graph-aware Self-supervised Contrastive Anomaly Ranking. In WWW."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33017370"}],"event":{"name":"GoodIT '25: International Conference on Information Technology for Social Good","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"],"location":"Antwerp Belgium","acronym":"GoodIT '25"},"container-title":["Proceedings of the 2025 International Conference on Information Technology for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748699.3749827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T11:01:19Z","timestamp":1765450879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748699.3749827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":28,"alternative-id":["10.1145\/3748699.3749827","10.1145\/3748699"],"URL":"https:\/\/doi.org\/10.1145\/3748699.3749827","relation":{},"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}