{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:27:10Z","timestamp":1774592830341,"version":"3.50.1"},"reference-count":31,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,23]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the rumor detection based on crowd intelligence, the crowd behavior is constructed as a graph model or probability mode. The detection of rumors is achieved through the collaborative utilization of data and knowledge. Aiming at the problems of insufficient feature extraction ability and data redundancy of current rumor detection methods based on deep learning model, a social network rumor detection method based on bidirectional gated recurrent unit (Bi-GRU) and double self-attention (DSA) mechanism is suggested. First, a combination of application program interface and third-party crawler approach is used to obtain microblogging data from publicly available fake microblogging information pages, including both rumor and non-rumor information. Second, Bi-GRU is used to capture the tendency of medium- and long-term dependence of data and is flexible enough to deal with variable length input. Finally, the DSA mechanism is introduced to help reduce the redundant information in the dataset, thereby enhancing the model\u2019s efficacy. The results of the experiments indicate that the proposed method outperforms existing advanced methods by at least 0.114, 0.108, 0.064, and 0.085 in terms of accuracy, precision, recall, and<jats:italic>F<\/jats:italic>1-scores, respectively. Therefore, the proposed method can significantly enhance the ability of social network rumor detection.<\/jats:p>","DOI":"10.1515\/comp-2023-0114","type":"journal-article","created":{"date-parts":[[2024,3,23]],"date-time":"2024-03-23T08:40:55Z","timestamp":1711183255000},"source":"Crossref","is-referenced-by-count":4,"title":["A Bi-GRU-DSA-based social network rumor detection approach"],"prefix":"10.1515","volume":"14","author":[{"given":"Xiang","family":"Huang","sequence":"first","affiliation":[{"name":"School of New Media Technology, Hunan Mass Media Vocational and Technical College , Changsha , Hunan, 410100 , China"}]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software, Hunan Vocational College of Science and Technology , Changsha , Hunan, 410118 , China"}]}],"member":"374","published-online":{"date-parts":[[2024,3,23]]},"reference":[{"key":"2024032308405366032_j_comp-2023-0114_ref_001","doi-asserted-by":"crossref","unstructured":"M. Ahsan, M. Kumari, and T. P. Sharma, \u201cRumors detection, verification and controlling mechanisms in online social networks: A survey,\u201d Online Soc. Netw. Media, vol. 14, pp. 100\u2013107, 2019.","DOI":"10.1016\/j.osnem.2019.100050"},{"key":"2024032308405366032_j_comp-2023-0114_ref_002","doi-asserted-by":"crossref","unstructured":"A. W. Wang, J. Y. Lan, M. H. Wang, and C. Yu, \u201cThe evolution of rumors on a closed social networking platform during COVID-19: Algorithm development and content study,\u201d JMIR Med. Inform., vol. 9, pp. 2001\u20132012, 2021.","DOI":"10.2196\/preprints.30467"},{"key":"2024032308405366032_j_comp-2023-0114_ref_003","doi-asserted-by":"crossref","unstructured":"R. M. Tripathy, A. Bagchi, and S. Mehta, \u201cTowards combating rumors in social networks: Models and metrics,\u201d Intell. Data Anal., vol. 17, pp. 149\u2013175, 2013.","DOI":"10.3233\/IDA-120571"},{"key":"2024032308405366032_j_comp-2023-0114_ref_004","doi-asserted-by":"crossref","unstructured":"A. Wang, W. Wu, and J. Chen, \u201cSocial network rumors spread model based on cellular automata,\u201d 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks, IEEE, 2014, pp. 236\u2013242.","DOI":"10.1109\/MSN.2014.39"},{"key":"2024032308405366032_j_comp-2023-0114_ref_005","doi-asserted-by":"crossref","unstructured":"W. Wang, Y. C. Qiu, S. C. Xuan, and W. Yang, \u201cEarly rumor detection based on deep recurrent Q-learning,\u201d Secur. Commun. Netw., vol. 2021, pp. 13\u201313, 2021, 10.1155\/2021\/5569064.","DOI":"10.1155\/2021\/5569064"},{"key":"2024032308405366032_j_comp-2023-0114_ref_006","doi-asserted-by":"crossref","unstructured":"S. Shelke and V. Attar, \u201cSource detection of rumor in social network\u2013a review,\u201d Online Soc. Netw. Media, vol. 9, pp. 30\u201342, 2019.","DOI":"10.1016\/j.osnem.2018.12.001"},{"key":"2024032308405366032_j_comp-2023-0114_ref_007","doi-asserted-by":"crossref","unstructured":"P. K. Roy and S. Chahar, \u201cFake profile detection on social networking websites: a comprehensive review,\u201d IEEE Trans. Artif. Intell., vol. 1, pp. 271\u2013285, 2020.","DOI":"10.1109\/TAI.2021.3064901"},{"key":"2024032308405366032_j_comp-2023-0114_ref_008","unstructured":"N. N. Al-Enezi, \u201cEmployment of social networking sites in response to rumors,\u201d J. Media Stud. Res., vol. 3, pp. 101\u2013123, 2020"},{"key":"2024032308405366032_j_comp-2023-0114_ref_009","doi-asserted-by":"crossref","unstructured":"Q. Li, Q. Zhang, L. Si, and Y. Liu, \u201cRumor detection on social media: Datasets, methods and opportunities,\u201d arXiv preprint arXiv, vol. 4, pp. 569\u2013578, 2019.","DOI":"10.18653\/v1\/D19-5008"},{"key":"2024032308405366032_j_comp-2023-0114_ref_010","doi-asserted-by":"crossref","unstructured":"H. K. Thakur, A. Gupta, A Bhardwaj, and D. Verma, \u201cRumor detection on Twitter using a supervised machine learning framework,\u201d Int. J. Inf. Retr. Res., vol. 8, pp. 1\u201313, 2018.","DOI":"10.4018\/IJIRR.2018070101"},{"key":"2024032308405366032_j_comp-2023-0114_ref_011","doi-asserted-by":"crossref","unstructured":"Y. K. Yang, K. Niu, and Z. Q. He, \u201cExploiting the topology property of social network for rumor detection,\u201d 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE), IEEE, 2015, pp. 41\u201346.","DOI":"10.1109\/JCSSE.2015.7219767"},{"key":"2024032308405366032_j_comp-2023-0114_ref_012","doi-asserted-by":"crossref","unstructured":"S. Tschiatschek, A. Singla, M. Gomez Rodriguez, A. Merchant, and A. Krause, \u201cFake news detection in social networks via crowd signals,\u201d Companion Proceedings of the Web Conference, 2018, pp. 517\u2013524.","DOI":"10.1145\/3184558.3188722"},{"key":"2024032308405366032_j_comp-2023-0114_ref_013","doi-asserted-by":"crossref","unstructured":"R. M. Tripathy, A. Bagchi, and S. Mehta, \u201cA study of rumor control strategies on social networks,\u201d Proceedings of the 19th ACM international conference on Information and knowledge management, 2010, pp. 1817\u20131820.","DOI":"10.1145\/1871437.1871737"},{"key":"2024032308405366032_j_comp-2023-0114_ref_014","doi-asserted-by":"crossref","unstructured":"A. P. B. Veyseh, M. T. Thai, T. H. Nguyen, and D. Dou, \u201cRumor detection in social networks via deep contextual modeling,\u201d Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, 2019, pp. 113\u2013120.","DOI":"10.1145\/3341161.3342896"},{"key":"2024032308405366032_j_comp-2023-0114_ref_015","doi-asserted-by":"crossref","unstructured":"M. Al-Sarem, W. Boulila, M. Al-Harby, J. Qadir, and A. Alsaeedi, \u201cDeep learning-based rumor detection on Weiboging platforms: a systematic review,\u201d IEEE Access, vol. 7, pp. 152788\u2013152812, 2019.","DOI":"10.1109\/ACCESS.2019.2947855"},{"key":"2024032308405366032_j_comp-2023-0114_ref_016","doi-asserted-by":"crossref","unstructured":"A. I. E. Hosni, K. Li, and S. Ahmad, \u201cMinimizing rumor influence in multiplex online social networks based on human individual and social behaviors,\u201d Inf. Sci., vol. 512, pp. 1458\u20131480, 2020.","DOI":"10.1016\/j.ins.2019.10.063"},{"key":"2024032308405366032_j_comp-2023-0114_ref_017","doi-asserted-by":"crossref","unstructured":"W. Xu, and H. Chen, \u201cScalable rumor source detection under independent cascade model in online social networks,\u201d 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), IEEE, 2015, pp. 236\u2013242.","DOI":"10.1109\/MSN.2015.36"},{"key":"2024032308405366032_j_comp-2023-0114_ref_018","doi-asserted-by":"crossref","unstructured":"S. Srinivasan and D. B. LD, \u201cA parallel neural network approach for faster rumor identification in online social networks,\u201d Int. J. Semantic Web Inf. Syst., vol. 15, pp. 69\u201389, 2019.","DOI":"10.4018\/IJSWIS.2019100105"},{"key":"2024032308405366032_j_comp-2023-0114_ref_019","doi-asserted-by":"crossref","unstructured":"S. Shelke and V. Attar, \u201cRumor detection in social network based on user, content and lexical features,\u201d Multimed. Tools Appl., vol. 81, pp. 17347\u201317368, 2022.","DOI":"10.1007\/s11042-022-12761-y"},{"key":"2024032308405366032_j_comp-2023-0114_ref_020","doi-asserted-by":"crossref","unstructured":"K. Shu, D. Mahudeswaran, and H. Liu, \u201cFakeNewsTracker: A tool for fake news collection, detection, and visualization,\u201d Comput Math. Organ. Theory, vol. 25, pp. 60\u201371, 2019.","DOI":"10.1007\/s10588-018-09280-3"},{"key":"2024032308405366032_j_comp-2023-0114_ref_021","unstructured":"C. Guo, J. Cao, X. Zhang, K. Shu, and H. Liu, \u201cDean: Learning dual emotion for fake news detection on social media,\u201d arXiv e-prints, vol. 9, pp. 1\u201311, 2019."},{"key":"2024032308405366032_j_comp-2023-0114_ref_022","doi-asserted-by":"crossref","unstructured":"T.P. Patel, T.N. Kim, G. Yu, V.S. Dedania, P. Lieu, C.X. Qian, et al., \u201cAttention-based convolutional approach for misinformation identification from massive and noisy Weibo posts,\u201d Computers Secur, vol. 8, pp. 106\u2013121, 2019.","DOI":"10.1016\/j.cose.2019.02.003"},{"key":"2024032308405366032_j_comp-2023-0114_ref_023","unstructured":"J. Ma, W. Gao, P. Mitra, S. Kwon, B. J. Jansen, K. F. Wong, et al., \u201cDetecting rumors from Weibos with recurrent neural networks,\u201d International Joint Conference on Artificial Intelligence, 2016, pp. 1\u201311."},{"key":"2024032308405366032_j_comp-2023-0114_ref_024","doi-asserted-by":"crossref","unstructured":"F. Yu, Q. Liu, S Wu, L. Wang, and T. Tan, \u201cA convolutional approach for misinformation identification,\u201d IJCAI, pp. 3901\u20133907, 2017.","DOI":"10.24963\/ijcai.2017\/545"},{"key":"2024032308405366032_j_comp-2023-0114_ref_025","doi-asserted-by":"crossref","unstructured":"N. G. Bhuvaneswari Amma and S. Selvakumar, \u201cRumorDetect: Detection of rumors in twitter using convolutional deep tweet learning approach,\u201d International Conference On Computational Vision and Bio Inspired Computing, Cham, Springer, 2019, 422\u2013430.","DOI":"10.1007\/978-3-030-37218-7_48"},{"key":"2024032308405366032_j_comp-2023-0114_ref_026","doi-asserted-by":"crossref","unstructured":"C. Bing, Y. Wu, F. Dong, S. Xu, X. Liu, and S. Sun, \u201cDual Co-attention-based multi-feature fusion method for rumor detection,\u201d Information, vol. 13, pp. 25\u201332, 2022.","DOI":"10.3390\/info13010025"},{"key":"2024032308405366032_j_comp-2023-0114_ref_027","unstructured":"J. Ma, W. Gao, P. Mitra, S. Kwon, B. J. Jansen, K. F. Wong, et al., \u201cDetecting rumors from microblogs with recurrent neural networks,\u201d Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence (IJCAI), 2016, pp. 3818\u20133824."},{"key":"2024032308405366032_j_comp-2023-0114_ref_028","doi-asserted-by":"crossref","unstructured":"J. Choudrie, S. Patil, K. Kotecha, N. Matta, and I. Pappas, \u201cApplying and understanding an advanced, novel deep learning approach: A Covid 19, text based, emotions analysis study,\u201d Inf. Syst. Front., vol. 23, pp. 1431\u20131465, 2021.","DOI":"10.1007\/s10796-021-10152-6"},{"key":"2024032308405366032_j_comp-2023-0114_ref_029","doi-asserted-by":"crossref","unstructured":"B. Kratzwald, S. Ili\u0107, M. Kraus, S. Feuerriegel and H. Prendinger, \u201cDeep learning for affective computing: Text-based emotion recognition in decision support,\u201d Decis. Support. Syst., vol. 115, pp. 24\u201335, 2018.","DOI":"10.1016\/j.dss.2018.09.002"},{"key":"2024032308405366032_j_comp-2023-0114_ref_030","doi-asserted-by":"crossref","unstructured":"S. Ahmad, M. Z. Asghar, F. M Alotaibi, and S. Khan, \u201cClassification of poetry text into the emotional states using deep learning technique,\u201d IEEE Access, vol. 8, pp. 73865\u201373878, 2020.","DOI":"10.1109\/ACCESS.2020.2987842"},{"key":"2024032308405366032_j_comp-2023-0114_ref_031","doi-asserted-by":"crossref","unstructured":"E. A. H. Khalil, E. M. F. Houby, and H. K. Mohamed. \u201cDeep learning for emotion analysis in Arabic tweets,\u201d J. Big Data, vol. 8, pp. 1\u201315, 2021.","DOI":"10.1186\/s40537-021-00523-w"}],"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2023-0114\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2023-0114\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T22:45:39Z","timestamp":1731624339000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/comp-2023-0114\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3,23]]},"published-print":{"date-parts":[[2024,3,23]]}},"alternative-id":["10.1515\/comp-2023-0114"],"URL":"https:\/\/doi.org\/10.1515\/comp-2023-0114","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,1]]},"article-number":"20230114"}}