{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:03:06Z","timestamp":1773655386528,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080393","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1215-1221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Fake Post Detection Using Graph Neural Networks"],"prefix":"10.3103","volume":"55","author":[{"given":"O. A.","family":"Izotova","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7458_CR1","doi-asserted-by":"publisher","unstructured":"Zegzhda, P., Zegzhda, D., Pavlenko, E., and Ignatev, G., Applying deep learning techniques for Android malware detection, Proc. 11th Int. Conf. on Security of Information and Networks, 2018, New York: Association for Computing Machinery, 2018, p. 7. \u00a0https:\/\/doi.org\/10.1145\/3264437.3264476","DOI":"10.1145\/3264437.3264476"},{"key":"7458_CR2","doi-asserted-by":"publisher","first-page":"874","DOI":"10.3103\/S0146411617080296","volume":"51","author":"P.D. Zegzhda","year":"2017","unstructured":"Zegzhda, P.D., Malyshev, E.V., and Pavlenko, E.Yu., The use of an artificial neural network to detect automatically managed accounts in social networks, Autom. Control. Comput. Sci., 2017, vol. 51, no. 8, pp. 874\u2013880. \u00a0https:\/\/doi.org\/10.3103\/S0146411617080296","journal-title":"Autom. Control. Comput. Sci."},{"key":"7458_CR3","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/S0146411620080222","volume":"54","author":"D.S. Lavrova","year":"2020","unstructured":"Lavrova, D.S. and Shtyrkina, A.A., The analysis of artificial neural network structure recovery possibilities based on the theory of graphs, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 977\u2013982. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080222","journal-title":"Autom. Control Comput. Sci."},{"key":"7458_CR4","doi-asserted-by":"publisher","unstructured":"Branitskiy, A. and Kotenko, I., Applying artificial intelligence methods to network attack detection, in AI in Cybersecurity, Sikos, L., Ed., Intelligent Systems Reference Library, vol. 151, Cham: Springer, 2019, pp. 115\u2013149. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-98842-9_5","DOI":"10.1007\/978-3-319-98842-9_5"},{"key":"7458_CR5","doi-asserted-by":"publisher","unstructured":"Gori, M., Monfardini, G., and Scarselli, F., A new model for learning in graph domains, Proc. 2005 IEEE Int. Joint Conf. on Neural Networks, Montreal, 2005, IEEE, 2005, vol. 2, pp.\u00a0729\u2013734. \u00a0https:\/\/doi.org\/10.1109\/IJCNN.2005.1555942","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"7458_CR6","unstructured":"Introduction to graph neural networks. https:\/\/heartbeat.fritz.ai\/introduction-to-graph-neural-networks-c5a9f4aa9e99."},{"key":"7458_CR7","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TNNLS.2020.2978386","volume":"32","author":"Z. Wu","year":"2021","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Yu, P.S., A comprehensive survey on graph neural networks, IEEE Trans. Neural Networks Learn. Syst., 2021, vol. 32, no. 1, pp. 4\u201324. \u00a0https:\/\/doi.org\/10.1109\/TNNLS.2020.2978386","journal-title":"IEEE Trans. Neural Networks Learn. Syst."},{"key":"7458_CR8","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/72.572108","volume":"8","author":"A. Sperduti","year":"1997","unstructured":"Sperduti, A. and Starita, A., Supervised neural networks for the classification of structures, IEEE Trans. Neural Networks, 1997, vol. 8, no. 3, pp. 714\u2013735.\u00a0https:\/\/doi.org\/10.1109\/72.572108","journal-title":"IEEE Trans. Neural Networks"},{"key":"7458_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F. Scarselli","year":"2009","unstructured":"Scarselli, F., Gori, M., and Tsoi, A.C., Hagenbuchner, M., and Monfardini, G., The graph neural network model, IEEE Trans. Neural Networks, 2009, vol. 20, no. 1, pp. 61\u201380. \u00a0https:\/\/doi.org\/10.1109\/TNN.2008.2005605","journal-title":"IEEE Trans. Neural Networks"},{"key":"7458_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J. Zhou","year":"2020","unstructured":"Zhou, J., Cui, G., Hu, S., Zhang, Z., Yang, C., Liu, Z., Wang, L., Li, C., and Sun, M., Graph neural networks: a review of methods and applications, AI Open, 2020, vol. 1, pp. 57\u201381. \u00a0https:\/\/doi.org\/10.1016\/j.aiopen.2021.01.001","journal-title":"AI Open"},{"key":"7458_CR11","doi-asserted-by":"crossref","unstructured":"Hu, L., Yang, T., Zhang, L., Zhong, W., Tang, D., Shi, C., Duan, N., and Zhou, M., Compare to the knowledge: Graph neural fake news detection with external knowledge, Proc. 59th Ann. Meeting of the Association for Computational Linguistics and the 11th Int. Joint Conf. on Natural Language Processing, 2021, pp. 754\u2013763.","DOI":"10.18653\/v1\/2021.acl-long.62"},{"key":"7458_CR12","doi-asserted-by":"publisher","unstructured":"Ren, Y., Wang, B., Zhang, J., and Chang, Y., Adversarial active learning based heterogeneous graph neural network for fake news detection, IEEE Int. Conf. on Data Mining (ICDM), Sorrento, Italy, 2020, IEEE, 2020, pp.\u00a0452\u2013461. \u00a0https:\/\/doi.org\/10.1109\/ICDM50108.2020.00054","DOI":"10.1109\/ICDM50108.2020.00054"},{"key":"7458_CR13","doi-asserted-by":"publisher","unstructured":"Li, C. and Goldwasser, D., Encoding social information with graph convolutional networks forpolitical perspective detection in news media, Proc. 57th Ann. Meeting of the Association for Computational Linguistics, Florence, 2019, Korhonen, A., Traum, D., and M\u00e0rquez, L., Eds., Florence: Association for Computational Linguistics, 2019, pp. 2594\u20132604. \u00a0https:\/\/doi.org\/10.18653\/v1\/P19-1247","DOI":"10.18653\/v1\/P19-1247"},{"key":"7458_CR14","unstructured":"Shu K., Mahudeswaran, D., Wang, S., Lee, D., and Liu, H., FakeNewsNet: A data repository with news content, social context and spatialtemporal information for studying fake news on social media, 2018. arXiv:1809.01286 [cs.SI]"},{"key":"7458_CR15","doi-asserted-by":"crossref","unstructured":"Han, Y., Karunasekera, S., and Leckie, C. Graph neural networks with continual learning for fake news detection from social media, 2020. arXiv:2007.03316 [cs.SI]","DOI":"10.1007\/978-3-030-86340-1_30"},{"key":"7458_CR16","unstructured":"Fey M. and Lenssen, J.E., Fast graph representation learning with PyTorch Geometric, 2019. arXiv:1903.02428 [cs.LG]"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080393.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080393","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080393.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:55Z","timestamp":1773612235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7458"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080393","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"3 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}