{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:14:09Z","timestamp":1761808449001,"version":"3.41.2"},"reference-count":33,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T00:00:00Z","timestamp":1620777600000},"content-version":"vor","delay-in-days":131,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61876134","U1836112","U1536204"],"award-info":[{"award-number":["61876134","U1836112","U1536204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The social network has become the primary medium of rumor propagation. Moreover, manual identification of rumors is extremely time\u2010consuming and laborious. It is crucial to identify rumors automatically. Machine learning technology is widely implemented in the identification and detection of misinformation on social networks. However, the traditional machine learning methods profoundly rely on feature engineering and domain knowledge, and the learning ability of temporal features is insufficient. Furthermore, the features used by the deep learning method based on natural language processing are heavily limited. Therefore, it is of great significance and practical value to study the rumor detection method independent of feature engineering and effectively aggregate heterogeneous features to adapt to the complex and variable social network. In this paper, a deep neural network\u2010 (DNN\u2010) based feature aggregation modeling method is proposed, which makes full use of the knowledge of propagation pattern feature and text content feature of social network event without feature engineering and domain knowledge. The experimental results show that the feature aggregation model has achieved 94.4% of accuracy as the best performance in recent works.<\/jats:p>","DOI":"10.1155\/2021\/6659430","type":"journal-article","created":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T19:20:09Z","timestamp":1620847209000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An End\u2010to\u2010End Rumor Detection Model Based on Feature Aggregation"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4151-7439","authenticated-orcid":false,"given":"Aoshuang","family":"Ye","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8085-1312","authenticated-orcid":false,"given":"Lina","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2842-5137","authenticated-orcid":false,"given":"Run","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenqi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianpeng","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Danlei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,5,12]]},"reference":[{"volume-title":"The Psychology of Rumor","year":"1947","author":"Allport G. W.","key":"e_1_2_10_1_2"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2612298"},{"key":"e_1_2_10_3_2","doi-asserted-by":"crossref","unstructured":"YuF. LiuQ. WuS. WangL. andTanT. A convolutional approach for misinformation identification Proceedings of the 26th International Joint Conference on Artificial Intelligence August 2017 Melbourne Australia 3901\u20133907.","DOI":"10.24963\/ijcai.2017\/545"},{"key":"e_1_2_10_4_2","doi-asserted-by":"crossref","unstructured":"MaJ. GaoW. andWongK. F. Rumor detection on twitter with tree-structured recursive neural networks The 56th Annual Meeting of the Association for Computational Linguistics May 2018 Melbourne Australia.","DOI":"10.18653\/v1\/P18-1184"},{"key":"e_1_2_10_5_2","unstructured":"RuchanskyN. SeoS. andLiuY. C. A hybrid deep model for fake news detection Proceedings of the 2017 ACM on Conference on Information and Knowledge Management November 2017 Singapore 797\u2013806."},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2591993"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2706674"},{"key":"e_1_2_10_8_2","doi-asserted-by":"crossref","unstructured":"GuoB. DingY. YaoL. LiangY. andYuZ. The future of false information detection on social media Proceedings of the ACM Computing Surveys (CSUR) July 2020 New York NY USA.","DOI":"10.1145\/3393880"},{"key":"e_1_2_10_9_2","doi-asserted-by":"crossref","unstructured":"RatkiewiczJ. ConoverM. MeissM. R. Gon\u00e7alvesB. FlamminiA. andMenczerF. Detecting and tracking political abuse in social media Proceedings of the Fifth International Conference on Weblogs and Social Media July 2011 Barcelona Spain 297\u2013304.","DOI":"10.1609\/icwsm.v5i1.14127"},{"key":"e_1_2_10_10_2","unstructured":"QazvinianV. RosengrenE. RadevD. R. andMeiQ. Rumor has it: identifying misinformation in microblogs Proceedings of the Conference on Empirical Methods in Natural Language Processing July 2011 1589\u20131599."},{"key":"e_1_2_10_11_2","unstructured":"VedovaM. TacchiniE. MoretS. BallarinG. andAlfaroL. D. Automatic online fake news detection combining content and social signals Proceedings of the 22nd Conference of Fruct Association April 2018 Petrozavodsk Russia."},{"key":"e_1_2_10_12_2","doi-asserted-by":"crossref","unstructured":"TakahashiT.andIgataN. Rumor detection on Twitter Proceedings of the 13th International Symposium on Advanced Intelligent Systems (ISIS) 2012 Joint 6th International Conference on Soft Computing and Intelligent Systems (SCIS) November 2012 Kobe Japan 452\u2013457.","DOI":"10.1109\/SCIS-ISIS.2012.6505254"},{"key":"e_1_2_10_13_2","doi-asserted-by":"crossref","unstructured":"ZhangQ. ZhangS. DongJ. XiongJ. andChengX. Automatic detection of rumor on social network Proceedings of the Natural Language Processing and Chinese Computing October 2015 Nanchang China 113\u2013122.","DOI":"10.1007\/978-3-319-25207-0_10"},{"key":"e_1_2_10_14_2","doi-asserted-by":"crossref","unstructured":"ZhaoZ. ResnickP. andMeiQ. Enquiring minds: early detection of rumors in social media from enquiry posts Proceedings of the 24th International Conference on World Wide Web May 2015 Florence Italy 1395\u20131405.","DOI":"10.1145\/2736277.2741637"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.abb5824"},{"key":"e_1_2_10_16_2","doi-asserted-by":"crossref","unstructured":"MendozaM. PobleteB. andCastilloC. Twitter under crisis: can we trust what we RT? Proceedings of the First Workshop on Social Media Analytics July 2010 New York NY USA 71\u201379.","DOI":"10.1145\/1964858.1964869"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"LiuY.andWuY. B. Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks Proceedings of the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18) February 2018 New Orleans LO USA.","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"e_1_2_10_18_2","doi-asserted-by":"crossref","unstructured":"RosenfeldN. SzantoA. andParkesD. C. A kernel of truth: determining rumor veracity on twitter by diffusion pattern alone Proceedings of the Web Conference 2020 April 2020 Taipei Taiwan.","DOI":"10.1145\/3366423.3380180"},{"key":"e_1_2_10_19_2","doi-asserted-by":"crossref","unstructured":"BianT. XiaoX. XuT.et al. Rumor detection on social media with bi-directional graph convolutional networks Proceedings of the Tenth AAAI Symposium on Educational Advances in Artificial Intelligence EAAI 2020 February 2020 New York NY USA.","DOI":"10.1609\/aaai.v34i01.5393"},{"key":"e_1_2_10_20_2","doi-asserted-by":"crossref","unstructured":"KwonS. ChaM. JungK. andChenW. Prominent features of rumor propagation in online social media Proceedings of the International Conference on Data Mining December 2013 Dallas TX USA.","DOI":"10.1109\/ICDM.2013.61"},{"key":"e_1_2_10_21_2","doi-asserted-by":"crossref","unstructured":"MaJ. GaoW. WeiZ. LuY. andWongK. F. Detect rumors using time series of social context information on microblogging websites Proceedings of the 24th ACM International on Conference on Information and Knowledge Management October 2015 Melbourne Australia 1751\u20131754.","DOI":"10.1145\/2806416.2806607"},{"key":"e_1_2_10_22_2","doi-asserted-by":"crossref","unstructured":"CastilloC. MendozaM. andPobleteB. Information credibility on Twitter Proceedings of the 20th International Conference on World Wide Web March 2011 Hyderabad India 675\u2013684.","DOI":"10.1145\/1963405.1963500"},{"key":"e_1_2_10_23_2","doi-asserted-by":"crossref","unstructured":"YangF. LiuY. YuX. andYangM. Automatic detection of rumor on sina weibo Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics August 2012 Beijing China.","DOI":"10.1145\/2350190.2350203"},{"key":"e_1_2_10_24_2","doi-asserted-by":"crossref","unstructured":"WuK. YangS. andZhuK. Q. False rumors detection on sina weibo by propagation structures Proceedings of the 2015 IEEE 31st International Conference on Data Engineering (ICDE) April 2015 Seoul South Korea 651\u2013662.","DOI":"10.1109\/ICDE.2015.7113322"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113595"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1108\/17440081111141772"},{"key":"e_1_2_10_27_2","doi-asserted-by":"crossref","unstructured":"GuptaA.andKumaraguruP. Credibility ranking of tweets during high impact events Proceedings of the 1st Workshop on Privacy and Security in Online Social Media April 2012 Lyon France.","DOI":"10.1145\/2185354.2185356"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2016.2517458"},{"key":"e_1_2_10_29_2","doi-asserted-by":"crossref","unstructured":"SunS. LiuH. HeJ. andDuX. Detecting event rumors on sina weibo automatically Proceedings of the Web Technologies and Applications April 2013 Sydney Australia 120\u2013131.","DOI":"10.1007\/978-3-642-37401-2_14"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.01.095"},{"key":"e_1_2_10_31_2","unstructured":"MaJ. GaoW. MitraP.et al. Detecting rumors from microblogs with recurrent neural networks Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence July 2016 New York NY USA 3818\u20133824."},{"key":"e_1_2_10_32_2","article-title":"Call attention to rumors: deep attention based recurrent neural networks for early rumor detectio","author":"Chen T.","year":"2017","journal-title":"n"},{"key":"e_1_2_10_33_2","unstructured":"TielemanT.andHintonG. Divide the gradient by a running average of its recent magnitude COURSERA: Neural Networks for Machine Learning Technical Report 2017 https:\/\/zh.coursera.org\/learn\/neuralnetworks\/lecture\/YQHki\/rmsprop-divide-the-gradient-by-a-running-average-of-its-recent-magnitude."}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6659430.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/6659430.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6659430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T22:15:15Z","timestamp":1723241715000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6659430"}},"subtitle":[],"editor":[{"given":"Hocine","family":"Cherifi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6659430"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6659430","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-12-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6659430"}}