{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:06Z","timestamp":1773615726557,"version":"3.50.1"},"reference-count":19,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700890","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:33:53Z","timestamp":1771936433000},"page":"1345-1356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting the Spread of False News Content Using Machine Learning"],"prefix":"10.3103","volume":"59","author":[{"given":"D. S.","family":"Lavrova","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Zyryanova","sequence":"additional","affiliation":[]},{"given":"A. A.","family":"Lyrchikov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7924_CR1","unstructured":"How often do web users encounter fake information?. https:\/\/gipp.ru\/. Cited March 13, 2025."},{"key":"7924_CR2","unstructured":"How to recognize fake news. https:\/\/www.kaspersky.ru\/resource-center\/preemptive-safety\/how-to-identify-fake-news. Cited March 13, 2025."},{"key":"7924_CR3","doi-asserted-by":"publisher","unstructured":"Pisarevskaya, D., Deception detection in news reports in the Russian language: Lexics and discourse, Proceedings of the 2017 EMNLP Workshop: Natural Language Processing Meets Journalism, Copenhagen, 2017, Popescu, O. and Strapparava, C., Eds., Association for Computational Linguistics, 2017, pp. 74\u201379. https:\/\/doi.org\/10.18653\/v1\/w17-4213","DOI":"10.18653\/v1\/w17-4213"},{"key":"7924_CR4","unstructured":"Zaynutdinova, A., Pisarevskaya, D., Zubov, M., and Makarov, I., Deception detection in online media, CEUR Workshop Proc., 2025, vol. 2479, p. 5. https:\/\/ceur-ws.org\/Vol-2479\/project5.pdf. Cited March 13, 2025."},{"key":"7924_CR5","unstructured":"Kuzmin, G., Larionov, D., Pisarevskaya, D., and Smirnov, I., Fake news detection for the Russian language, Proceedings of the 3rd International Workshop on Rumours and Deception in Social Media (RDSM), 2020, pp. 45\u201357."},{"key":"7924_CR6","unstructured":"Panorama: Satirical publication. https:\/\/panorama.pub\/. Cited March 16, 2025."},{"key":"7924_CR7","doi-asserted-by":"publisher","unstructured":"Liu, Ya. and Wu, Y.-F., Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks, Proceedings of the AAAI Conference on Artificial Intelligence, 2018, vol. 32, no. 1. https:\/\/doi.org\/10.1609\/aaai.v32i1.11268","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"7924_CR8","doi-asserted-by":"publisher","unstructured":"Zhao, Z., Resnick, P., and Mei, Q., Enquiring minds: Early detection of rumors in social media from enquiry posts, Proceedings of the 24th International Conference on World Wide Web, Florence, 2015, International World Wide Web Conferences Steering Committee, 2015, pp. 1395\u20131405. https:\/\/doi.org\/10.1145\/2736277.2741637","DOI":"10.1145\/2736277.2741637"},{"key":"7924_CR9","unstructured":"Ma, J., Gao, W., Mitra, P., Kwon, S., Jansen, B.J., Wong, K.-F., and Cha, M., Detecting rumors from microblogs with recurrent neural networks, Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI 2016), New York: AAAI Press, 2016, pp. 3818\u20133824."},{"key":"7924_CR10","doi-asserted-by":"publisher","unstructured":"Ma, J., Gao, W., and Wong, K.-F., Detect rumors in microblog posts using propagation structure via kernel learning, Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, Vancouver, Canada, 2017, Barzilay, R. and Kan, M.-Y., Eds., Association for Computational Linguistics, 2017, vol. 1, pp. 708\u2013717. https:\/\/doi.org\/10.18653\/v1\/p17-1066","DOI":"10.18653\/v1\/p17-1066"},{"key":"7924_CR11","doi-asserted-by":"publisher","first-page":"934","DOI":"10.3103\/s0146411622080211","volume":"56","author":"E.A. Rudnitskaya","year":"2022","unstructured":"Rudnitskaya, E.A. and Poltavtseva, M.A., Adversarial machine learning protection using the example of evasion attacks on medical images, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 934\u2013941. https:\/\/doi.org\/10.3103\/s0146411622080211","journal-title":"Autom. Control Comput. Sci."},{"key":"7924_CR12","doi-asserted-by":"publisher","unstructured":"Kosaraju, R.P., Muindi, J., and Lundia, Ya., Manipulation detector: Distinguishing between real and manipulated images, SSRN Electronic Journal, 2022. https:\/\/doi.org\/10.2139\/ssrn.4114990","DOI":"10.2139\/ssrn.4114990"},{"key":"7924_CR13","doi-asserted-by":"publisher","unstructured":"Gunawan, A., Lovenia, H., and Pramudita, A.H., Deteksi pemalsuan gambar dengan ELA dan deep learning, 2018. https:\/\/doi.org\/10.13140\/RG.2.2.28571.52006","DOI":"10.13140\/RG.2.2.28571.52006"},{"key":"7924_CR14","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I. Goodfellow","year":"2020","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, Sh., Courville, A., and Bengio, Yo., Generative adversarial networks, Commun. ACM, 2020, vol. 63, no. 11, pp. 139\u2013144. https:\/\/doi.org\/10.1145\/3422622","journal-title":"Commun. ACM"},{"key":"7924_CR15","unstructured":"Vaswani, A., Shazeer, N., Parmar, N., et al., Attention is all you need, Advances in Neural Information Processing Systems, 2017, vol. 30."},{"key":"7924_CR16","doi-asserted-by":"publisher","unstructured":"Devlin, J., Chang, M.-W., Lee, K., and Toutanova, K., BERT: Pre-training of deep bidirectional transformers for language understanding, Proceedings of the North American Chapter of the Association for Computational Linguistics (NAACL 2019), Minneapolis, MN, 2019, Burstein, J., Doran, Ch., and Solorio, T., Eds., Association for Computational Linguistics, 2019, vol. 1, pp. 4171\u20134186. https:\/\/doi.org\/10.18653\/v1\/N19-1423","DOI":"10.18653\/v1\/N19-1423"},{"key":"7924_CR17","doi-asserted-by":"publisher","unstructured":"Wang, S.-Y., Wang, O., Zhang, R., Owens, A., and Efros, A.A., CNN-generated images are surprisingly easy to spot\u2026 for now, 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, 2020, IEEE, 2020, pp. 8695\u20138704. https:\/\/doi.org\/10.1109\/cvpr42600.2020.00872","DOI":"10.1109\/cvpr42600.2020.00872"},{"key":"7924_CR18","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3103\/s0146411621080198","volume":"55","author":"I.I. Marshev","year":"2021","unstructured":"Marshev, I.I., Zhukovskii, E.V., and Aleksandrova, E.B., Protection against adversarial attacks on malware detectors using machine learning algorithms, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1025\u20131028. https:\/\/doi.org\/10.3103\/s0146411621080198","journal-title":"Autom. Control Comput. Sci."},{"key":"7924_CR19","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, Sh., and Sun, J., Deep residual learning for image recognition, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, 2016, IEEE, 2016, pp. 770\u2013778. https:\/\/doi.org\/10.1109\/cvpr.2016.90","DOI":"10.1109\/cvpr.2016.90"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700890.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700890","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700890.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:46Z","timestamp":1773612226000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700890"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":19,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7924"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700890","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"7 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}