{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T19:01:02Z","timestamp":1771268462541,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,2,22]]},"DOI":"10.1145\/3773966.3779403","type":"proceedings-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T17:50:01Z","timestamp":1771264201000},"page":"1221-1226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Credibility Drift Attacks: LLM Crafted Adversarial Manipulations That Flip News Believability"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5333-9873","authenticated-orcid":false,"given":"Mostofa Najmus","family":"Sakib","sequence":"first","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0361-9728","authenticated-orcid":false,"given":"Francesca","family":"Spezzano","sequence":"additional","affiliation":[{"name":"Boise State University, Boise, ID, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,2,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Amer AlGhadhban, Meshari Alazmi, Ahmad Alzamil, Khaled Alutaibi, and Junaid Qadir.","author":"Ali Hassan","year":"2021","unstructured":"Hassan Ali, Muhammad Suleman Khan, Amer AlGhadhban, Meshari Alazmi, Ahmad Alzamil, Khaled Alutaibi, and Junaid Qadir. 2021. All your fake detector are belong to us: Evaluating adversarial robustness of fake-news detectors under black-box settings. Authorea Preprints (2021)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"e_1_3_2_1_3_1","volume-title":"Generating natural language adversarial examples. arXiv preprint arXiv:1804.07998","author":"Alzantot Moustafa","year":"2018","unstructured":"Moustafa Alzantot, Yash Sharma, Ahmed Elgohary, Bo-Jhang Ho, Mani Srivastava, and Kai-Wei Chang. 2018. Generating natural language adversarial examples. arXiv preprint arXiv:1804.07998 (2018)."},{"key":"e_1_3_2_1_4_1","unstructured":"Anonymous. 2025. News Believability Attack Repository. https:\/\/anonymous.4open.science\/r\/News_Believability_Attack-4CE6\/README.md. Accessed: 2025-09-25."},{"key":"e_1_3_2_1_5_1","unstructured":"Nidhal Baccouri. 2025. deep-translator: A flexible free and unlimited python tool to translate between different languages. https:\/\/pypi.org\/project\/deep-translator\/. Accessed: 2025-09-25."},{"key":"e_1_3_2_1_6_1","volume-title":"Synthetic and natural noise both break neural machine translation. arXiv preprint arXiv:1711.02173","author":"Belinkov Yonatan","year":"2017","unstructured":"Yonatan Belinkov and Yonatan Bisk. 2017. Synthetic and natural noise both break neural machine translation. arXiv preprint arXiv:1711.02173 (2017)."},{"key":"e_1_3_2_1_7_1","first-page":"1523","article-title":"The adversarial ufp\/ufn attack: A new threat to ml-based fake news detection systems?","author":"Brown Brandon","year":"2020","unstructured":"Brandon Brown, Alexicia Richardson, Marcellus Smith, Gerry Dozier, and Michael C King. 2020b. The adversarial ufp\/ufn attack: A new threat to ml-based fake news detection systems?. In SSCI. IEEE, 1523-1527.","journal-title":"SSCI. IEEE"},{"key":"e_1_3_2_1_8_1","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020a. Language models are few-shot learners. Advances in neural information processing systems Vol. 33 (2020) 1877-1901."},{"key":"e_1_3_2_1_9_1","volume-title":"TurQUaz at CheckThat! 2024: creating adversarial examples using genetic algorithm. CLEF","author":"Demirok Basak","year":"2024","unstructured":"Basak Demirok, Mucahid Kutlu, Selin Mergen, and Bugra Oz. 2024. TurQUaz at CheckThat! 2024: creating adversarial examples using genetic algorithm. CLEF (2024)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4159\/9780674239302"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Qingxiu Dong Lei Li Damai Dai Ce Zheng Jingyuan Ma Rui Li Heming Xia Jingjing Xu Zhiyong Wu Tianyu Liu Baobao Chang Xu Sun Lei Li and Zhifang Sui. 2024. A Survey on In-context Learning. arXiv:2301.00234 [cs.CL] https:\/\/arxiv.org\/abs\/2301.00234","DOI":"10.18653\/v1\/2024.emnlp-main.64"},{"key":"e_1_3_2_1_12_1","volume-title":"Hotflip: White-box adversarial examples for text classification. arXiv preprint arXiv:1712.06751","author":"Ebrahimi Javid","year":"2017","unstructured":"Javid Ebrahimi, Anyi Rao, Daniel Lowd, and Dejing Dou. 2017. Hotflip: White-box adversarial examples for text classification. arXiv preprint arXiv:1712.06751 (2017)."},{"key":"e_1_3_2_1_13_1","volume-title":"Framing: Towards clarification of a fractured paradigm. McQuail's reader in mass communication theory","author":"Entman Robert M","year":"1993","unstructured":"Robert M Entman. 1993. Framing: Towards clarification of a fractured paradigm. McQuail's reader in mass communication theory, Vol. 390 (1993), 397."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1037\/xge0000098","article-title":"Knowledge does not protect against illusory truth","volume":"144","author":"Fazio Lisa K","year":"2015","unstructured":"Lisa K Fazio, Nadia M Brashier, B Keith Payne, and Elizabeth J Marsh. 2015. Knowledge does not protect against illusory truth. Journal of experimental psychology: general, Vol. 144, 5 (2015), 993.","journal-title":"Journal of experimental psychology: general"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"e0282663","DOI":"10.1371\/journal.pone.0282663","article-title":"Effects of rhetorical devices on audience responses with online videos: An augmented elaboration likelihood model","volume":"18","author":"Feng Guangchao Charles","year":"2023","unstructured":"Guangchao Charles Feng, Yiwen Luo, Zhenwei Yu, and Jinlang Wen. 2023a. Effects of rhetorical devices on audience responses with online videos: An augmented elaboration likelihood model. PLoS One, Vol. 18, 3 (2023), e0282663.","journal-title":"PLoS One"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"7","author":"Kevin Feng KJ","year":"2023","unstructured":"KJ Kevin Feng, Nick Ritchie, Pia Blumenthal, Andy Parsons, and Amy X Zhang. 2023b. Examining the impact of provenance-enabled media on trust and accuracy perceptions. Proceedings of the ACM on Human-Computer Interaction, Vol. 7, CSCW2 (2023), 1-42."},{"key":"e_1_3_2_1_17_1","volume-title":"An adversarial benchmark for fake news detection models. arXiv preprint arXiv:2201.00912","author":"Yu Flores Lorenzo Jaime","year":"2022","unstructured":"Lorenzo Jaime Yu Flores and Yiding Hao. 2022. An adversarial benchmark for fake news detection models. arXiv preprint arXiv:2201.00912 (2022)."},{"key":"e_1_3_2_1_18_1","volume-title":"Diachronic word embeddings reveal statistical laws of semantic change. arXiv preprint arXiv:1605.09096","author":"Hamilton William L","year":"2016","unstructured":"William L Hamilton, Jure Leskovec, and Dan Jurafsky. 2016. Diachronic word embeddings reveal statistical laws of semantic change. arXiv preprint arXiv:1605.09096 (2016)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Tony Harcup. 2014. A dictionary of journalism. OUP Oxford.","DOI":"10.1093\/acref\/9780199646241.001.0001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(77)80012-1"},{"key":"e_1_3_2_1_21_1","unstructured":"Samuel Hoffstaetter. 2024. pytesseract 0.3.13. https:\/\/pypi.org\/project\/pytesseract\/. Accessed: 2025-09-25."},{"key":"e_1_3_2_1_22_1","volume-title":"The curious case of neural text degeneration. arXiv preprint arXiv:1904.09751","author":"Holtzman Ari","year":"2019","unstructured":"Ari Holtzman, Jan Buys, Li Du, Maxwell Forbes, and Yejin Choi. 2019. The curious case of neural text degeneration. arXiv preprint arXiv:1904.09751 (2019)."},{"key":"e_1_3_2_1_23_1","first-page":"1","article-title":"Robust fake news detection over time and attack","volume":"11","author":"Horne Benjamin D","year":"2019","unstructured":"Benjamin D Horne, Jeppe N\u00f8rregaard, and Sibel Adali. 2019. Robust fake news detection over time and attack. ACM TIST, Vol. 11, 1 (2019), 1-23.","journal-title":"ACM TIST"},{"key":"e_1_3_2_1_24_1","volume-title":"The influence of source credibility on communication effectiveness. Public opinion quarterly","author":"Hovland Carl I","year":"1951","unstructured":"Carl I Hovland and Walter Weiss. 1951. The influence of source credibility on communication effectiveness. Public opinion quarterly, Vol. 15, 4 (1951), 635-650."},{"key":"e_1_3_2_1_25_1","volume-title":"Writing without conviction? Hedging in science research articles. Applied linguistics","author":"Hyland Ken","year":"1996","unstructured":"Ken Hyland. 1996. Writing without conviction? Hedging in science research articles. Applied linguistics, Vol. 17, 4 (1996), 433-454."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Ken Hyland. 1998. Hedging in scientific research articles. (1998).","DOI":"10.1075\/pbns.54"},{"key":"e_1_3_2_1_27_1","volume-title":"Automatic detection of generated text is easiest when humans are fooled. arXiv preprint arXiv:1911.00650","author":"Ippolito Daphne","year":"2019","unstructured":"Daphne Ippolito, Daniel Duckworth, Chris Callison-Burch, and Douglas Eck. 2019. Automatic detection of generated text is easiest when humans are fooled. arXiv preprint arXiv:1911.00650 (2019)."},{"key":"e_1_3_2_1_28_1","volume-title":"Adversarial example generation with syntactically controlled paraphrase networks. arXiv preprint arXiv:1804.06059","author":"Iyyer Mohit","year":"2018","unstructured":"Mohit Iyyer, John Wieting, Kevin Gimpel, and Luke Zettlemoyer. 2018. Adversarial example generation with syntactically controlled paraphrase networks. arXiv preprint arXiv:1804.06059 (2018)."},{"key":"e_1_3_2_1_29_1","volume-title":"Adversarial examples for evaluating reading comprehension systems. arXiv preprint arXiv:1707.07328","author":"Jia Robin","year":"2017","unstructured":"Robin Jia and Percy Liang. 2017. Adversarial examples for evaluating reading comprehension systems. arXiv preprint arXiv:1707.07328 (2017)."},{"key":"e_1_3_2_1_30_1","volume-title":"Joey Tianyi Zhou, and Peter Szolovits","author":"Jin Di","year":"2019","unstructured":"Di Jin, Zhijing Jin, Joey Tianyi Zhou, and Peter Szolovits. 2019. Is BERT Really Robust? Natural Language Attack on Text Classification and Entailment. arXiv preprint arXiv:1907.11932 (2019)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-025-00790-3"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103599"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v18i1.31360"},{"key":"e_1_3_2_1_34_1","first-page":"282","article-title":"Malcom: Generating malicious comments to attack neural fake news detection models","author":"Le Thai","year":"2020","unstructured":"Thai Le, Suhang Wang, and Dongwon Lee. 2020. Malcom: Generating malicious comments to attack neural fake news detection models. In ICDM. IEEE, 282-291.","journal-title":"ICDM. IEEE"},{"key":"e_1_3_2_1_35_1","volume-title":"Deep text classification can be fooled. arXiv preprint arXiv:1704.08006","author":"Liang Bin","year":"2017","unstructured":"Bin Liang, Hongcheng Li, Miaoqiang Su, Pan Bian, Xirong Li, and Wenchang Shi. 2017. Deep text classification can be fooled. arXiv preprint arXiv:1704.08006 (2017)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1177\/20966083231159737","article-title":"Revisiting the use of hedges and boosters in scientific research articles in Morocco: Caution that does not exclude conviction","volume":"6","author":"Mifdal Mohamed","year":"2023","unstructured":"Mohamed Mifdal and Marilyn Lewis. 2023. Revisiting the use of hedges and boosters in scientific research articles in Morocco: Caution that does not exclude conviction. Cultures of Science, Vol. 6, 1 (2023), 113-130.","journal-title":"Cultures of Science"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"key":"e_1_3_2_1_38_1","volume-title":"Adversarial NLI: A new benchmark for natural language understanding. arXiv preprint arXiv:1910.14599","author":"Nie Yixin","year":"2019","unstructured":"Yixin Nie, Adina Williams, Emily Dinan, Mohit Bansal, Jason Weston, and Douwe Kiela. 2019. Adversarial NLI: A new benchmark for natural language understanding. arXiv preprint arXiv:1910.14599 (2019)."},{"key":"e_1_3_2_1_39_1","volume-title":"SALSA: Salience-Based Switching Attack for Adversarial Perturbations in Fake News Detection Models","author":"Raj Chahat","year":"2024","unstructured":"Chahat Raj, Anjishnu Mukherjee, Hemant Purohit, Antonios Anastasopoulos, and Ziwei Zhu. 2024. SALSA: Salience-Based Switching Attack for Adversarial Perturbations in Fake News Detection Models. In ECIR. Springer, 35-49."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1103"},{"key":"e_1_3_2_1_41_1","volume-title":"Shielding google's language toxicity model against adversarial attacks. arXiv preprint arXiv:1801.01828","author":"Rodriguez Nestor","year":"2018","unstructured":"Nestor Rodriguez and Sergio Rojas-Galeano. 2018. Shielding google's language toxicity model against adversarial attacks. arXiv preprint arXiv:1801.01828 (2018)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3757691"},{"key":"e_1_3_2_1_43_1","volume-title":"Towards crafting text adversarial samples. arXiv preprint arXiv:1707.02812","author":"Samanta Suranjana","year":"2017","unstructured":"Suranjana Samanta and Sameep Mehta. 2017. Towards crafting text adversarial samples. arXiv preprint arXiv:1707.02812 (2017)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00062"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICERA\/ICIS59538.2023.10420056"},{"key":"e_1_3_2_1_46_1","volume-title":"Know when to stop: A study of semantic drift in text generation. arXiv preprint arXiv:2404.05411","author":"Spataru Ava","year":"2024","unstructured":"Ava Spataru, Eric Hambro, Elena Voita, and Nicola Cancedda. 2024. Know when to stop: A study of semantic drift in text generation. arXiv preprint arXiv:2404.05411 (2024)."},{"key":"e_1_3_2_1_47_1","volume-title":"FakeNewsPerception: An eye movement dataset on the perceived believability of news stories. Data in brief","author":"S\u00fcmer \u00d6mer","year":"2021","unstructured":"\u00d6mer S\u00fcmer, Efe Bozkir, Thomas K\u00fcbler, Sven Gr\u00fcner, Sonja Utz, and Enkelejda Kasneci. 2021. FakeNewsPerception: An eye movement dataset on the perceived believability of news stories. Data in brief, Vol. 35 (2021), 106909."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Sandeep Suntwal and Sue Brown. 2023. Text Versus Paratext: Understanding Individuals' Accuracy in Assessing Online Information. (2023).","DOI":"10.24251\/HICSS.2023.754"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-021-00153-5"},{"key":"e_1_3_2_1_50_1","unstructured":"The News Provenance Project \/ Brown Institute. 2020. The News Provenance Project. Project web page \/ Brown Institute. https:\/\/www.newsprovenanceproject.com\/ Applied work on provenance\/paratext to improve trust & traceability in news."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Poojitha Thota and Shirin Nilizadeh. 2024. Attacks against Abstractive Text Summarization Models through Lead Bias and Influence Functions. arXiv:2410.20019 [cs.CL] https:\/\/arxiv.org\/abs\/2410.20019","DOI":"10.18653\/v1\/2024.findings-emnlp.804"},{"key":"e_1_3_2_1_52_1","volume-title":"The framing of decisions and the psychology of choice. science","author":"Tversky Amos","year":"1981","unstructured":"Amos Tversky and Daniel Kahneman. 1981. The framing of decisions and the psychology of choice. science, Vol. 211, 4481 (1981), 453-458."},{"key":"e_1_3_2_1_53_1","volume-title":"The spread of true and false news online. science","author":"Vosoughi Soroush","year":"2018","unstructured":"Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false news online. science, Vol. 359, 6380 (2018), 1146-1151."},{"key":"e_1_3_2_1_54_1","volume-title":"Universal adversarial triggers for attacking and analyzing NLP. arXiv preprint arXiv:1908.07125","author":"Wallace Eric","year":"2019","unstructured":"Eric Wallace, Shi Feng, Nikhil Kandpal, Matt Gardner, and Sameer Singh. 2019. Universal adversarial triggers for attacking and analyzing NLP. arXiv preprint arXiv:1908.07125 (2019)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583868"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 33rd ACM International Conference on Information and Knowledge Management. 2369-2378","author":"Wang Lanjun","year":"2024","unstructured":"Lanjun Wang, Zehao Wang, Le Wu, and An-An Liu. 2024. Bots shield fake news: adversarial attack on user engagement based fake news detection. In Proceedings of the 33rd ACM International Conference on Information and Knowledge Management. 2369-2378."},{"key":"e_1_3_2_1_57_1","first-page":"40","article-title":"Lateral reading: Reading less and learning more when evaluating digital information","volume":"121","author":"Wineburg Sam","year":"2019","unstructured":"Sam Wineburg and Sarah McGrew. 2019. Lateral reading: Reading less and learning more when evaluating digital information. Teachers College Record, Vol. 121 (2019), 40.","journal-title":"Teachers College Record"},{"key":"e_1_3_2_1_58_1","unstructured":"Peng Xu Chien-Sheng Wu Andrea Madotto and Pascale Fung. 2019. Clickbait? Sensational Headline Generation with Auto-tuned Reinforcement Learning. arXiv:1909.03582 [cs.CL] https:\/\/arxiv.org\/abs\/1909.03582"},{"key":"e_1_3_2_1_59_1","unstructured":"Xudong Zhang Zan Wang Jingke Zhao and Lanjun Wang. 2022. Targeted Data Poisoning Attack on News Recommendation System by Content Perturbation. arXiv:2203.03560 [cs.CR] https:\/\/arxiv.org\/abs\/2203.03560"},{"key":"e_1_3_2_1_60_1","volume-title":"A general black-box adversarial attack on graph-based fake news detectors. arXiv preprint arXiv:2404.15744","author":"Zhu Peican","year":"2024","unstructured":"Peican Zhu, Zechen Pan, Yang Liu, Jiwei Tian, Keke Tang, and Zhen Wang. 2024. A general black-box adversarial attack on graph-based fake news detectors. arXiv preprint arXiv:2404.15744 (2024)."}],"event":{"name":"WSDM '26:The Nineteenth ACM International Conference on Web Search and Data Mining","location":"Boise ID USA","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval","SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the Nineteenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"deposited":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:01:27Z","timestamp":1771264887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773966.3779403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,21]]},"references-count":60,"alternative-id":["10.1145\/3773966.3779403","10.1145\/3773966"],"URL":"https:\/\/doi.org\/10.1145\/3773966.3779403","relation":{},"subject":[],"published":{"date-parts":[[2026,2,21]]},"assertion":[{"value":"2026-02-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}