skip to main content
survey

The Future of False Information Detection on Social Media: New Perspectives and Trends

Authors Info & Claims
Published:11 July 2020Publication History
Skip Abstract Section

Abstract

The massive spread of false information on social media has become a global risk, implicitly influencing public opinion and threatening social/political development. False information detection (FID) has thus become a surging research topic in recent years. As a promising and rapidly developing research field, we find that much effort has been paid to new research problems and approaches of FID. Therefore, it is necessary to give a comprehensive review of the new research trends of FID. We first give a brief review of the literature history of FID, based on which we present several new research challenges and techniques of it, including early detection, detection by multimodal data fusion, and explanatory detection. We further investigate the extraction and usage of various crowd intelligence in FID, which paves a promising way to tackle FID challenges. Finally, we give our views on the open issues and future research directions of FID, such as model adaptivity/generality to new events, embracing of novel machine learning models, aggregation of crowd wisdom, adversarial attack and defense in detection models, and so on.

References

  1. Alberto Acerbi. 2019. Cognitive attraction and online misinformation. Palgrave Commun. 5, 1 (2019), 15.Google ScholarGoogle ScholarCross RefCross Ref
  2. Amina Adadi and Mohammed Berrada. 2018. Peeking inside the black-box: A survey on explainable artificial intelligence (XAI). IEEE Access 6 (2018), 52138--52160.Google ScholarGoogle ScholarCross RefCross Ref
  3. R. Adlolphs. 2003. Cognitive neuroscience of human social behavior. Nat. Rev. Neurosci. 4, 3 (2003), 165--178.Google ScholarGoogle ScholarCross RefCross Ref
  4. Naveed Akhtar and Ajmal Mian. 2018. Threat of adversarial attacks on deep learning in computer vision: A survey. IEEE Access 6 (2018), 14410--14430.Google ScholarGoogle ScholarCross RefCross Ref
  5. Abdullah Almaatouq, Erez Shmueli, Mariam Nouh, Ahmad Alabdulkareem, Vivek K. Singh, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, et al. 2016. If it looks like a spammer and behaves like a spammer, it must be a spammer: Analysis and detection of microblogging spam accounts. Int. J. Inf. Secur. 15, 5 (2016), 475--491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ioannis Arapakis, Miguel Barreda-Angeles, and Alexandre Pereda-Baños. 2017. Interest as a proxy of engagement in news reading: Spectral and entropy analyses of EEG activity patterns. IEEE Trans. Affect. Comput. 10, 1 (2017), 100--114.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2014. Neural machine translation by jointly learning to align and translate. Arxiv Preprint Arxiv:1409.0473 (2014).Google ScholarGoogle Scholar
  8. Jonathan Bakdash, Char Sample, Monica Rankin, Murat Kantarcioglu, Jennifer Holmes, Sue Kase, Erin Zaroukian, and Boleslaw Szymanski. 2018. The future of deception: Machine-generated and manipulated images, video, and audio?. In Proceedings of the 2018 International Workshop on Social Sensing (SocialSens). IEEE, 2--2.Google ScholarGoogle ScholarCross RefCross Ref
  9. Melika Behjati, Seyed-Mohsen Moosavi-Dezfooli, Mahdieh Soleymani Baghshah, and Pascal Frossard. 2019. Universal adversarial attacks on text classifiers. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 7345--7349.Google ScholarGoogle ScholarCross RefCross Ref
  10. Vahid Behzadan and Arslan Munir. 2017. Vulnerability of deep reinforcement learning to policy induction attacks. In Proceedings of the International Conference on Machine Learning and Data Mining in Pattern Recognition. Springer, 262--275.Google ScholarGoogle ScholarCross RefCross Ref
  11. Sreyasee Das Bhattacharjee, Ashit Talukder, and Bala Venkatram Balantrapu. 2017. Active learning based news veracity detection with feature weighting and deep-shallow fusion. In Proceedings of the 2017 IEEE International Conference on Big Data (Big Data). IEEE, 556--565.Google ScholarGoogle ScholarCross RefCross Ref
  12. Christina Boididou, Symeon Papadopoulos, Yiannis Kompatsiaris, Steve Schifferes, and Nic Newman. 2014. Challenges of computational verification in social multimedia. In Proceedings of the 23rd International Conference on World Wide Web. ACM, 743--748.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ceren Budak, Divyakant Agrawal, and Amr El Abbadi. 2011. Limiting the spread of misinformation in social networks. In Proceedings of the 20th International Conference on World Wide Web. 665--674.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Juan Cao, Junbo Guo, Xirong Li, Zhiwei Jin, Han Guo, and Jintao Li. 2018. Automatic rumor detection on microblogs: A survey. Arxiv Preprint Arxiv:1807.03505 (2018).Google ScholarGoogle Scholar
  15. Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. 2016. Hidden voice commands. In Proceedings of the 25th USENIX Security Symposium (USENIX Security’16). 513--530.Google ScholarGoogle Scholar
  16. Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. 2011. Information credibility on twitter. In Proceedings of the 20th International Conference on World Wide Web. ACM, 675--684.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. 2013. Predicting information credibility in time-sensitive social media. Internet Res. 23, 5 (2013), 560--588.Google ScholarGoogle ScholarCross RefCross Ref
  18. Rose Catherine, Kathryn Mazaitis, Maxine Eskenazi, and William Cohen. 2017. Explainable entity-based recommendations with knowledge graphs. Arxiv Preprint Arxiv:1707.05254 (2017).Google ScholarGoogle Scholar
  19. Sneha Chaudhari, Gungor Polatkan, Rohan Ramanath, and Varun Mithal. 2019. An attentive survey of attention models. Arxiv Preprint Arxiv:1904.02874 (2019).Google ScholarGoogle Scholar
  20. Tong Chen, Xue Li, Hongzhi Yin, and Jun Zhang. 2018. Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 40--52.Google ScholarGoogle ScholarCross RefCross Ref
  21. Wenji Chen, Yang Liu, and Yong Guan. 2013. Cardinality change-based early detection of large-scale cyber-attacks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’13). IEEE, 1788--1796.Google ScholarGoogle ScholarCross RefCross Ref
  22. Weiling Chen, Yan Zhang, Chai Kiat Yeo, Chiew Tong Lau, and Bu Sung Lee. 2018. Unsupervised rumor detection based on users’ behaviors using neural networks. Pattern Recogn. Lett. 105 (2018), 226--233.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Xu Chen, Yongfeng Zhang, Hongteng Xu, Yixin Cao, Zheng Qin, and Hongyuan Zha. 2018. Visually explainable recommendation. Arxiv Preprint Arxiv:1801.10288 (2018).Google ScholarGoogle Scholar
  24. Heng-Tze Cheng, Levent Koc, Jeremiah Harmsen, Tal Shaked, Tushar Chandra, Hrishi Aradhye, Glen Anderson, Greg Corrado, Wei Chai, Mustafa Ispir, et al. 2016. Wide 8 deep learning for recommender systems. In Proceedings of the 1st Workshop on Deep Learning for Recommender Systems. ACM, 7--10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Kyunghyun Cho, Bart Van Merriënboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. Arxiv Preprint Arxiv:1406.1078 (2014).Google ScholarGoogle Scholar
  26. Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 963--972.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. Social fingerprinting: Detection of spambot groups through DNA-inspired behavioral modeling. IEEE Trans. Depend. Sec. Comput. 15, 4 (2017), 561--576.Google ScholarGoogle Scholar
  28. Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, and Le Song. 2018. Adversarial attack on graph structured data. Arxiv Preprint Arxiv:1806.02371 (2018).Google ScholarGoogle Scholar
  29. Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In Advances in Neural Information Processing Systems. 3844--3852.Google ScholarGoogle Scholar
  30. Marco L. Della Vedova, Eugenio Tacchini, Stefano Moret, Gabriele Ballarin, Massimo DiPierro, and Luca de Alfaro. 2018. Automatic online fake news detection combining content and social signals. In Proceedings of the 2018 22nd Conference of Open Innovations Association (FRUCT’18). IEEE, 272--279.Google ScholarGoogle ScholarCross RefCross Ref
  31. Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Imagenet: A large-scale hierarchical image database. In Proceedings of the 2009 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 248--255.Google ScholarGoogle ScholarCross RefCross Ref
  32. Manqing Dong, Lina Yao, Xianzhi Wang, Boualem Benatallah, Quan Z. Sheng, and Hao Huang. 2018. DUAL: A deep unified attention model with latent relation representations for fake news detection. In International Conference on Web Information Systems Engineering. Springer, 199--209.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Ming Dong, Bolong Zheng, Nguyen Quoc Viet Hung, Han Su, and Guohui Li. 2019. Multiple rumor source detection with graph convolutional networks. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management. ACM, 569--578.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Finale Doshi-Velez and Been Kim. 2018. Considerations for evaluation and generalization in interpretable machine learning. In Explainable and Interpretable Models in Computer Vision and Machine Learning. Springer, 3--17.Google ScholarGoogle Scholar
  35. Mengnan Du, Ninghao Liu, and Xia Hu. 2019. Techniques for interpretable machine learning. Commun. ACM 63, 1 (2019), 68--77.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Don Fallis. 2015. What is disinformation? Library Trends 63, 3 (2015), 401--426.Google ScholarGoogle ScholarCross RefCross Ref
  37. Mehrdad Farajtabar, Jiachen Yang, Xiaojing Ye, Huan Xu, Rakshit Trivedi, Elias Khalil, Shuang Li, Le Song, and Hongyuan Zha. 2017. Fake news mitigation via point process based intervention. In Proceedings of the 34th International Conference on Machine Learning-Volume 70. 1097--1106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Alireza Farasat, Alexander Nikolaev, Sargur N. Srihari, and Rachael Hageman Blair. 2015. Probabilistic graphical models in modern social network analysis. Soc. Netw. Anal. Min. 5, 1 (2015), 62.Google ScholarGoogle ScholarCross RefCross Ref
  39. Miriam Fernandez and Harith Alani. 2018. Online misinformation: Challenges and future directions. In Companion Proceedings of the The Web Conference 2018. International World Wide Web Conferences Steering Committee, 595--602.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016), 96--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Pasquale Ferrara, Tiziano Bianchi, Alessia De Rosa, and Alessandro Piva. 2012. Image forgery localization via fine-grained analysis of CFA artifacts. IEEE Trans. Inf. Forens. Secur. 7, 5 (2012), 1566--1577.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. William Ferreira and Andreas Vlachos. 2016. Emergent: A novel data-set for stance classification. In Proceedings of the 2016 conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 1163--1168.Google ScholarGoogle ScholarCross RefCross Ref
  43. Chelsea Finn, Pieter Abbeel, and Sergey Levine. 2017. Model-agnostic meta-learning for fast adaptation of deep networks. In Proceedings of the 34th International Conference on Machine Learning-Volume 70. 1126--1135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Luciano Floridi. 2018. Artificial intelligence, deepfakes and a future of ectypes. Philos. Technol. 31, 3 (2018), 317--321.Google ScholarGoogle ScholarCross RefCross Ref
  45. Jessica Fridrich and Jan Kodovsky. 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forens. Secur. 7, 3 (2012), 868--882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Adrien Friggeri, Lada Adamic, Dean Eckles, and Justin Cheng. 2014. Rumor cascades. In Proceedings of the 8th International AAAI Conference on Weblogs and Social Media.Google ScholarGoogle Scholar
  47. Mohamed H. Gad-Elrab, Daria Stepanova, Jacopo Urbani, and Gerhard Weikum. 2019. ExFaKT: A framework for explaining facts over knowledge graphs and text. In Proceedings of the 12th ACM International Conference on Web Search and Data Mining. ACM, 87--95.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Ruiying Geng, Binhua Li, Yongbin Li, Xiaodan Zhu, Ping Jian, and Jian Sun. 2019. Induction networks for few-shot text classification. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). 3895--3904.Google ScholarGoogle ScholarCross RefCross Ref
  49. Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks. In Proceedings of the 13th international conference on artificial intelligence and statistics. 249--256.Google ScholarGoogle Scholar
  50. Xavier Glorot, Antoine Bordes, and Yoshua Bengio. 2011. Domain adaptation for large-scale sentiment classification: A deep learning approach. In Proceedings of the 28th International Conference on Machine Learning (ICML’11). 513--520.Google ScholarGoogle Scholar
  51. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems. 2672--2680.Google ScholarGoogle Scholar
  52. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. Arxiv Preprint Arxiv:1412.6572 (2014).Google ScholarGoogle Scholar
  53. Genevieve Gorrell, Elena Kochkina, Maria Liakata, Ahmet Aker, Arkaitz Zubiaga, Kalina Bontcheva, and Leon Derczynski. 2019. SemEval-2019 task 7: RumourEval, determining rumour veracity and support for rumours. In Proceedings of the 13th International Workshop on Semantic Evaluation. 845--854.Google ScholarGoogle ScholarCross RefCross Ref
  54. Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 855--864.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Gisel Bastidas Guacho, Sara Abdali, Neil Shah, and Evangelos E. Papalexakis. 2018. Semi-supervised content-based detection of misinformation via tensor embeddings. In Proceedings of the 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’18). IEEE, 322--325.Google ScholarGoogle Scholar
  56. David Güera and Edward J. Delp. 2018. Deepfake video detection using recurrent neural networks. In Proceedings of the 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS’18). IEEE, 1--6.Google ScholarGoogle Scholar
  57. Andrew Guess, Jonathan Nagler, and Joshua Tucker. 2019. Less than you think: Prevalence and predictors of fake news dissemination on facebook. Sci. Adv. 5, 1 (2019), eaau4586.Google ScholarGoogle Scholar
  58. Bin Guo, Chao Chen, Daqing Zhang, Zhiwen Yu, and Alvin Chin. 2016. Mobile crowd sensing and computing: When participatory sensing meets participatory social media. IEEE Commun. Mag. 54, 2 (2016), 131--137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Bin Guo, Jing Li, Vincent W. Zheng, Zhu Wang, and Zhiwen Yu. 2018. Citytransfer: Transferring inter-and intra-city knowledge for chain store site recommendation based on multi-source urban data. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 4 (2018), 135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Han Guo, Juan Cao, Yazi Zhang, Junbo Guo, and Jintao Li. 2018. Rumor detection with hierarchical social attention network. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management. ACM, 943--951.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking sandy: Characterizing and identifying fake images on twitter during hurricane sandy. In Proceedings of the 22nd International Conference on World Wide Web. ACM, 729--736.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Manish Gupta, Peixiang Zhao, and Jiawei Han. 2012. Evaluating event credibility on twitter. In Proceedings of the 2012 SIAM International Conference on Data Mining. SIAM, 153--164.Google ScholarGoogle ScholarCross RefCross Ref
  63. Andreas Hanselowski, Avinesh P. V. S., Benjamin Schiller, Felix Caspelherr, Debanjan Chaudhuri, Christian M. Meyer, and Iryna Gurevych. 2018. A retrospective analysis of the fake news challenge stance detection task. Arxiv Preprint Arxiv:1806.05180 (2018).Google ScholarGoogle Scholar
  64. Geoffrey E. Hinton and Ruslan R. Salakhutdinov. 2006. Reducing the dimensionality of data with neural networks. Science 313, 5786 (2006), 504--507.Google ScholarGoogle Scholar
  65. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural Comput. 9, 8 (1997), 1735--1780.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Bryan Hooi, Neil Shah, Alex Beutel, Stephan Günnemann, Leman Akoglu, Mohit Kumar, Disha Makhija, and Christos Faloutsos. 2016. Birdnest: Bayesian inference for ratings-fraud detection. In Proceedings of the 2016 SIAM International Conference on Data Mining. SIAM, 495--503.Google ScholarGoogle ScholarCross RefCross Ref
  67. Benjamin D. Horne and Sibel Adali. 2017. This just in: Fake news packs a lot in title, uses simpler, repetitive content in text body, more similar to satire than real news. In Proceedings of the 11th International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar
  68. Xia Hu, Jiliang Tang, Huiji Gao, and Huan Liu. 2014. Social spammer detection with sentiment information. In Proceedings of the 2014 IEEE International Conference on Data Mining. IEEE, 180--189.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Minyoung Huh, Andrew Liu, Andrew Owens, and Alexei A. Efros. 2018. Fighting fake news: Image splice detection via learned self-consistency. In Proceedings of the European Conference on Computer Vision (ECCV’18). 101--117.Google ScholarGoogle Scholar
  70. Jun Ito, Jing Song, Hiroyuki Toda, Yoshimasa Koike, and Satoshi Oyama. 2015. Assessment of tweet credibility with LDA features. In Proceedings of the 24th International Conference on World Wide Web. ACM, 953--958.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Robin Jia and Percy Liang. 2017. Adversarial examples for evaluating reading comprehension systems. Arxiv Preprint Arxiv:1707.07328 (2017).Google ScholarGoogle Scholar
  72. Zhiwei Jin, Juan Cao, Han Guo, Yongdong Zhang, and Jiebo Luo. 2017. Multimodal fusion with recurrent neural networks for rumor detection on microblogs. In Proceedings of the 25th ACM International Conference on Multimedia. ACM, 795--816.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Zhiwei Jin, Juan Cao, Han Guo, Yongdong Zhang, Yu Wang, and Jiebo Luo. 2017. Detection and analysis of 2016 us presidential election related rumors on twitter. In International Conference on Social Computing, Behavioral-cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation. Springer, 14--24.Google ScholarGoogle ScholarCross RefCross Ref
  74. Zhiwei Jin, Juan Cao, Yu-Gang Jiang, and Yongdong Zhang. 2014. News credibility evaluation on microblog with a hierarchical propagation model. In Proceedings of the 2014 IEEE International Conference on Data Mining. IEEE, 230--239.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Zhiwei Jin, Juan Cao, Jiebo Luo, and Yongdong Zhang. 2016. Image credibility analysis with effective domain transferred deep networks. Arxiv Preprint Arxiv:1611.05328 (2016).Google ScholarGoogle Scholar
  76. Zhiwei Jin, Juan Cao, Yongdong Zhang, and Jiebo Luo. 2016. News verification by exploiting conflicting social viewpoints in microblogs. In Proceedings of the 30th AAAI Conference on Artificial Intelligence.Google ScholarGoogle Scholar
  77. Zhiwei Jin, Juan Cao, Yongdong Zhang, Jianshe Zhou, and Qi Tian. 2016. Novel visual and statistical image features for microblogs news verification. IEEE Trans. Multimedia 19, 3 (2016), 598--608.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Dhruv Khattar, Jaipal Singh Goud, Manish Gupta, and Vasudeva Varma. 2019. MVAE: Multimodal variational autoencoder for fake news detection. In Proceedings of the World Wide Web Conference. ACM, 2915--2921.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. Jooyeon Kim, Dongkwan Kim, and Alice Oh. 2019. Homogeneity-based transmissive process to model true and false news in social networks. In Proceedings of the 12th ACM International Conference on Web Search and Data Mining. ACM, 348--356.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Jooyeon Kim, Behzad Tabibian, Alice Oh, Bernhard Schölkopf, and Manuel Gomez-Rodriguez. 2018. Leveraging the crowd to detect and reduce the spread of fake news and misinformation. In Proceedings of the 11th ACM International Conference on Web Search and Data Mining. ACM, 324--332.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Yoon Kim. 2014. Convolutional neural networks for sentence classification. Arxiv Preprint Arxiv:1408.5882 (2014).Google ScholarGoogle Scholar
  82. Diederik P. Kingma and Max Welling. 2014. Stochastic gradient VB and the variational auto-encoder. In Second International Conference on Learning Representations (ICLR’14), Vol. 19.Google ScholarGoogle Scholar
  83. Thomas N. Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. Arxiv Preprint Arxiv:1609.02907 (2016).Google ScholarGoogle Scholar
  84. Daphne Koller and Nir Friedman. 2009. Probabilistic Graphical Models: Principles and Techniques. MIT Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Pavel Korshunov and Sébastien Marcel. 2019. Vulnerability assessment and detection of deepfake videos. In 2019 International Conference on Biometrics (ICB’19). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  86. Volodymyr Kuleshov, Shantanu Thakoor, Tingfung Lau, and Stefano Ermon. 2018. Adversarial examples for natural language classification problems. https://openreview.net/forum.Google ScholarGoogle Scholar
  87. K. P. Krishna Kumar and G. Geethakumari. 2014. Detecting misinformation in online social networks using cognitive psychology. Human-centric Comput. Inf. Sci. 4, 1 (2014), 14.Google ScholarGoogle ScholarCross RefCross Ref
  88. Srijan Kumar, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, and V. S. Subrahmanian. 2018. Rev2: Fraudulent user prediction in rating platforms. In Proceedings of the 11th ACM International Conference on Web Search and Data Mining. ACM, 333--341.Google ScholarGoogle Scholar
  89. Srijan Kumar and Neil Shah. 2018. False information on web and social media: A survey. Arxiv Preprint Arxiv:1804.08559 (2018).Google ScholarGoogle Scholar
  90. Sejeong Kwon, Meeyoung Cha, Kyomin Jung, Wei Chen, and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In Proceedings of the 2013 IEEE 13th International Conference on Data Mining. IEEE, 1103--1108.Google ScholarGoogle ScholarCross RefCross Ref
  91. David M. J. Lazer, Matthew A. Baum, Yochai Benkler, Adam J. Berinsky, Kelly M. Greenhill, Filippo Menczer, Miriam J. Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, et al. 2018. The science of fake news. Science 359, 6380 (2018), 1094--1096.Google ScholarGoogle Scholar
  92. Stephan Lewandowsky, Ullrich K. H. Ecker, and John Cook. 2017. Beyond misinformation: Understanding and coping with the “post-truth” era. J. Appl. Res. Mem. Cogn. 6, 4 (2017), 353--369.Google ScholarGoogle ScholarCross RefCross Ref
  93. Stephan Lewandowsky, Ullrich K. H. Ecker, Colleen M. Seifert, Norbert Schwarz, and John Cook. 2012. Misinformation and its correction: Continued influence and successful debiasing. Psychol. Sci. Publ. Interest 13, 3 (2012), 106--131.Google ScholarGoogle ScholarCross RefCross Ref
  94. Lizhao Li, Guoyong Cai, and Nannan Chen. 2018. A rumor events detection method based on deep bidirectional GRU neural network. In Proceedings of the 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC’18). IEEE, 755--759.Google ScholarGoogle ScholarCross RefCross Ref
  95. Quanzhi Li, Qiong Zhang, and Luo Si. 2019. Rumor detection by exploiting user credibility information, attention and multi-task learning. In Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics. 1173--1179.Google ScholarGoogle ScholarCross RefCross Ref
  96. Wei Li, Wen-jun Wu, Huai-min Wang, Xue-qi Cheng, Hua-jun Chen, Zhi-hua Zhou, and Rong Ding. 2017. Crowd intelligence in AI 2.0 era. Front. Inf. Technol. Electr. Eng. 18, 1 (2017), 15--43.Google ScholarGoogle ScholarCross RefCross Ref
  97. Wee Yong Lim, Mong Li Lee, and Wynne Hsu. 2017. iFACT: An interactive framework to assess claims from tweets. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. ACM, 787--796.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Mengchen Liu, Liu Jiang, Junlin Liu, Xiting Wang, Jun Zhu, and Shixia Liu. 2017. Improving learning-from-crowds through expert validation. In Proceedings of the International Joint Conferences on Artficial Intelligence (IJCAI’17). 2329--2336.Google ScholarGoogle ScholarCross RefCross Ref
  99. Qiang Liu, Feng Yu, Shu Wu, and Liang Wang. 2018. Mining significant microblogs for misinformation identification: An attention-based approach. ACM Trans. Intell. Syst. Technol. 9, 5 (2018), 50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Xiaomo Liu, Armineh Nourbakhsh, Quanzhi Li, Rui Fang, and Sameena Shah. 2015. Real-time rumor debunking on twitter. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM, 1867--1870.Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Yang Liu and Yi-Fang Brook Wu. 2018. Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks. In Proceedingsof the 32nd AAAI Conference on Artificial Intelligence.Google ScholarGoogle Scholar
  102. Yang Liu and Songhua Xu. 2016. Detecting rumors through modeling information propagation networks in a social media environment. IEEE Trans. Comput. Soc. Syst. 3, 2 (2016), 46--62.Google ScholarGoogle ScholarCross RefCross Ref
  103. Mingsheng Long, Yue Cao, Jianmin Wang, and Michael I. Jordan. 2015. Learning transferable features with deep adaptation networks. In International Conference on Machine Learning. 97--105.Google ScholarGoogle Scholar
  104. Yunfei Long, Qin Lu, Rong Xiang, Minglei Li, and Chu-Ren Huang. 2017. Fake news detection through multi-perspective speaker profiles. In Proceedings of the 8th International Joint Conference on Natural Language Processing (Volume 2: Short Papers). 252--256.Google ScholarGoogle Scholar
  105. Fenglong Ma, Yaliang Li, Qi Li, Minghui Qiu, Jing Gao, Shi Zhi, Lu Su, Bo Zhao, Heng Ji, and Jiawei Han. 2015. Faitcrowd: Fine grained truth discovery for crowdsourced data aggregation. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 745--754.Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Jing Ma, Wei Gao, Prasenjit Mitra, Sejeong Kwon, Bernard J Jansen, Kam-Fai Wong, and Meeyoung Cha. 2016. Detecting rumors from microblogs with recurrent neural networks. In Proceedings of the International Conferences on Artificial Intelligence (IJCAI’16). 3818--3824.Google ScholarGoogle Scholar
  107. Jing Ma, Wei Gao, Zhongyu Wei, Yueming Lu, and Kam-Fai Wong. 2015. Detect rumors using time series of social context information on microblogging websites. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM, 1751--1754.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Jing Ma, Wei Gao, and Kam-Fai Wong. 2017. Detect rumors in microblog posts using propagation structure via kernel learning. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). 708--717.Google ScholarGoogle ScholarCross RefCross Ref
  109. Jing Ma, Wei Gao, and Kam-Fai Wong. 2018. Detect rumor and stance jointly by neural multi-task learning. In Companion of The Web Conference 2018. International World Wide Web Conferences Steering Committee, 585--593.Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Jing Ma, Wei Gao, and Kam-Fai Wong. 2018. Rumor detection on twitter with tree-structured recursive neural networks. In Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). 1980--1989.Google ScholarGoogle ScholarCross RefCross Ref
  111. Jing Ma, Wei Gao, and Kam-Fai Wong. 2019. Detect rumors on twitter by promoting information campaigns with generative adversarial learning. In Proceedings of the World Wide Web Conference. ACM, 3049--3055.Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Scott McCloskey and Michael Albright. 2019. Detecting GAN-generated imagery using saturation cues. In 2019 IEEE International Conference on Image Processing (ICIP’19). IEEE, 4584--4588.Google ScholarGoogle ScholarCross RefCross Ref
  113. Pietro Michelucci and Janis L. Dickinson. 2016. The power of crowds. Science 351, 6268 (2016), 32--33.Google ScholarGoogle Scholar
  114. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems. 3111--3119.Google ScholarGoogle Scholar
  115. Amanda Minnich, Nikan Chavoshi, Danai Koutra, and Abdullah Mueen. 2017. BotWalk: Efficient adaptive exploration of twitter bot networks. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017. ACM, 467--474.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Saif M. Mohammad, Parinaz Sobhani, and Svetlana Kiritchenko. 2017. Stance and sentiment in tweets. ACM Trans. Internet Technol. 17, 3 (2017), 26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Federico Monti, Fabrizio Frasca, Davide Eynard, Damon Mannion, and Michael M. Bronstein. 2019. Fake news detection on social media using geometric deep learning. Arxiv Preprint Arxiv:1902.06673 (2019).Google ScholarGoogle Scholar
  118. Meredith Ringel Morris, Scott Counts, Asta Roseway, Aaron Hoff, and Julia Schwarz. 2012. Tweeting is believing?: Understanding microblog credibility perceptions. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. ACM, 441--450.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Lakshmanan Nataraj, Tajuddin Manhar Mohammed, B. S. Manjunath, Shivkumar Chandrasekaran, Arjuna Flenner, Jawadul H. Bappy, and Amit K. Roy-Chowdhury. 2019. Detecting GAN generated fake images using co-occurrence matrices. Electronic Imaging 2019, 5 (2019), 532-1--532-7.Google ScholarGoogle ScholarCross RefCross Ref
  120. An T. Nguyen, Aditya Kharosekar, Saumyaa Krishnan, Siddhesh Krishnan, Elizabeth Tate, Byron C. Wallace, and Matthew Lease. 2018. Believe it or not: Designing a human-AI partnership for mixed-initiative fact-checking. In Proceedings of the 31st Annual ACM Symposium on User Interface Software and Technology. ACM, 189--199.Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. An T. Nguyen, Aditya Kharosekar, Matthew Lease, and Byron Wallace. 2018. An interpretable joint graphical model for fact-checking from crowds. In Proceedings of the 32nd AAAI Conference on Artificial Intelligence.Google ScholarGoogle Scholar
  122. Nam P. Nguyen, Guanhua Yan, My T. Thai, and Stephan Eidenbenz. 2012. Containment of misinformation spread in online social networks. In Proceedings of the 4th Annual ACM Web Science Conference. 213--222.Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Tu Ngoc Nguyen, Cheng Li, and Claudia Niederée. 2017. On early-stage debunking rumors on twitter: Leveraging the wisdom of weak learners. In International Conference on Social Informatics. Springer, 141--158.Google ScholarGoogle ScholarCross RefCross Ref
  124. Besmira Nushi, Ece Kamar, and Eric Horvitz. 2018. Towards accountable AI: Hybrid human-machine analyses for characterizing system failure. In Proceedings of the 6th AAAI Conference on Human Computation and Crowdsourcing.Google ScholarGoogle Scholar
  125. Pinar Ozturk, Huaye Li, and Yasuaki Sakamoto. 2015. Combating rumor spread on social media: The effectiveness of refutation and warning. In Proceedings of the 2015 48th Hawaii International Conference on System Sciences. IEEE, 2406--2414.Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Sinno Jialin Pan and Qiang Yang. 2009. A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22, 10 (2009), 1345--1359.Google ScholarGoogle ScholarCross RefCross Ref
  127. Heiko Paulheim. 2017. Knowledge graph refinement: A survey of approaches and evaluation methods. Semant. Web 8, 3 (2017), 489--508.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Verónica Pérez-Rosas, Bennett Kleinberg, Alexandra Lefevre, and Rada Mihalcea. 2017. Automatic detection of fake news. Arxiv Preprint Arxiv:1708.07104 (2017).Google ScholarGoogle Scholar
  129. Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 701--710.Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. Russell A. Poldrack and Martha J. Farah. 2015. Progress and challenges in probing the human brain. Nature 526, 7573 (2015), 371.Google ScholarGoogle Scholar
  131. Kashyap Popat, Subhabrata Mukherjee, Jannik Strötgen, and Gerhard Weikum. 2017. Where the truth lies: Explaining the credibility of emerging claims on the web and social media. In Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 1003--1012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Kashyap Popat, Subhabrata Mukherjee, Jannik Strötgen, and Gerhard Weikum. 2018. CredEye: A credibility lens for analyzing and explaining misinformation. In Companion of the The Web Conference 2018 on The Web Conference 2018. International World Wide Web Conferences Steering Committee, 155--158.Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. Kashyap Popat, Subhabrata Mukherjee, Andrew Yates, and Gerhard Weikum. 2018. DeClarE: Debunking fake news and false claims using evidence-aware deep learning. Arxiv Preprint Arxiv:1809.06416 (2018).Google ScholarGoogle Scholar
  134. Martin Potthast, Johannes Kiesel, Kevin Reinartz, Janek Bevendorff, and Benno Stein. 2017. A stylometric inquiry into hyperpartisan and fake news. Arxiv Preprint Arxiv:1702.05638 (2017).Google ScholarGoogle Scholar
  135. Samira Pouyanfar, Saad Sadiq, Yilin Yan, Haiman Tian, Yudong Tao, Maria Presa Reyes, Mei-Ling Shyu, Shu-Ching Chen, and S. S. Iyengar. 2018. A survey on deep learning: Algorithms, techniques, and applications. ACM Comput. Surv. 51, 5 (2018), 92.Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. Vahed Qazvinian, Emily Rosengren, Dragomir R. Radev, and Qiaozhu Mei. 2011. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 1589--1599.Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. Peng Qi, Juan Cao, Tianyun Yang, Junbo Guo, and Jintao Li. 2019. Exploiting multi-domain visual information for fake news detection. In 2019 IEEE International Conference on Data Mining (ICDM’19). IEEE, 518--527.Google ScholarGoogle ScholarCross RefCross Ref
  138. Feng Qian, Chengyue Gong, Karishma Sharma, and Yan Liu. 2018. Neural user response generator: Fake news detection with collective user intelligence. In Proceedings of the Internaional Conferences on Artificial Intelligence (IJCAI’18). 3834--3840.Google ScholarGoogle ScholarCross RefCross Ref
  139. Shilin Qiu, Qihe Liu, Shijie Zhou, and Chunjiang Wu. 2019. Review of artificial intelligence adversarial attack and defense technologies. Appl. Sci. 9, 5 (2019), 909.Google ScholarGoogle ScholarCross RefCross Ref
  140. Xiaoyan Qiu, Diego F. M. Oliveira, Alireza Sahami Shirazi, Alessandro Flammini, and Filippo Menczer. 2017. Limited individual attention and online virality of low-quality information. Nat. Hum. Behav. 1, 7 (2017), 0132.Google ScholarGoogle ScholarCross RefCross Ref
  141. Hannah Rashkin, Eunsol Choi, Jin Yea Jang, Svitlana Volkova, and Yejin Choi. 2017. Truth of varying shades: Analyzing language in fake news and political fact-checking. In Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. 2931--2937.Google ScholarGoogle ScholarCross RefCross Ref
  142. Shebuti Rayana and Leman Akoglu. 2015. Collective opinion spam detection: Bridging review networks and metadata. In Proceedings of the 21th acm SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 985--994.Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. Victoria L. Rubin and Tatiana Lukoianova. 2015. Truth and deception at the rhetorical structure level. J. Assoc. Inf. Sci. Technol. 66, 5 (2015), 905--917.Google ScholarGoogle ScholarDigital LibraryDigital Library
  144. Natali Ruchansky, Sungyong Seo, and Yan Liu. 2017. Csi: A hybrid deep model for fake news detection. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. ACM, 797--806.Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. Derek Ruths. 2019. The misinformation machine. Science 363, 6425 (2019), 348--348.Google ScholarGoogle Scholar
  146. Ekraam Sabir, Wael AbdAlmageed, Yue Wu, and Prem Natarajan. 2018. Deep multimodal image-repurposing detection. In Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference. ACM, 1337--1345.Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. Ronald Salloum, Yuzhuo Ren, and C.-C. Jay Kuo. 2018. Image splicing localization using a multi-task fully convolutional network (MFCN). J. Vis. Commun. Image Represent. 51 (2018), 201--209.Google ScholarGoogle ScholarCross RefCross Ref
  148. Pouya Samangouei, Maya Kabkab, and Rama Chellappa. 2018. Defense-gan: Protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605 (2018).Google ScholarGoogle Scholar
  149. Justin Sampson, Fred Morstatter, Liang Wu, and Huan Liu. 2016. Leveraging the implicit structure within social media for emergent rumor detection. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management. ACM, 2377--2382.Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. Dietram A. Scheufele and Nicole M. Krause. 2019. Science audiences, misinformation, and fake news. Proc. Natl. Acad. Sci. U.S.A. 116, 16 (2019), 7662--7669.Google ScholarGoogle ScholarCross RefCross Ref
  151. Christin Scholz, Elisa C. Baek, Matthew Brook O’Donnell, Hyun Suk Kim, Joseph N. Cappella, and Emily B. Falk. 2017. A neural model of valuation and information virality. Proc. Natl. Acad. Sci. U.S.A. 114, 11 (2017), 2881--2886.Google ScholarGoogle ScholarCross RefCross Ref
  152. Florian Schroff, Dmitry Kalenichenko, and James Philbin. 2015. Facenet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 815--823.Google ScholarGoogle ScholarCross RefCross Ref
  153. Suranga Seneviratne, Aruna Seneviratne, Mohamed Ali Kaafar, Anirban Mahanti, and Prasant Mohapatra. 2015. Early detection of spam mobile apps. In Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 949--959.Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. Chengcheng Shao, Giovanni Luca Ciampaglia, Alessandro Flammini, and Filippo Menczer. 2016. Hoaxy: A platform for tracking online misinformation. In Proceedings of the 25th International Conference Companion on World Wide Web. 745--750.Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. Chengcheng Shao, Giovanni Luca Ciampaglia, Onur Varol, Kai-Cheng Yang, Alessandro Flammini, and Filippo Menczer. 2018. The spread of low-credibility content by social bots. Nat. Commun. 9, 1 (2018), 4787.Google ScholarGoogle ScholarCross RefCross Ref
  156. Karishma Sharma, Feng Qian, He Jiang, Natali Ruchansky, Ming Zhang, and Yan Liu. 2019. Combating fake news: A survey on identification and mitigation techniques. ACM Trans. Intell. Syst. Technol. 10, 3 (2019), 1--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. Baoxu Shi and Tim Weninger. 2016. Fact checking in heterogeneous information networks. In Proceedings of the 25th International Conference Companion on World Wide Web. International World Wide Web Conferences Steering Committee, 101--102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  158. Richard M. Shiffrin. 2016. Drawing causal inference from big data. Proc. Natl. Acad. Sci. U.S.A. 113, 27 (2016), 7308--7309.Google ScholarGoogle ScholarCross RefCross Ref
  159. Kai Shu, H. Russell Bernard, and Huan Liu. 2019. Studying fake news via network analysis: Detection and mitigation. In Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining. Springer, 43--65.Google ScholarGoogle Scholar
  160. Kai Shu, Deepak Mahudeswaran, and Huan Liu. 2019. FakeNewsTracker: A tool for fake news collection, detection, and visualization. Comput. Math. Organiz. Theory 25, 1 (2019), 60--71.Google ScholarGoogle ScholarDigital LibraryDigital Library
  161. Kai Shu, Deepak Mahudeswaran, Suhang Wang, Dongwon Lee, and Huan Liu. 2020. Fakenewsnet: A data repository with news content, social context and spatiotemporal information for studying fake news on social media. Big Data 8, 3 (2020), 171--188.Google ScholarGoogle ScholarCross RefCross Ref
  162. Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, and Huan Liu. 2017. Fake news detection on social media: A data mining perspective. ACM SIGKDD Explor. Newslett. 19, 1 (2017), 22--36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  163. Kai Shu, Suhang Wang, and Huan Liu. 2017. Exploiting tri-relationship for fake news detection. Arxiv Preprint Arxiv:1712.07709 (2017).Google ScholarGoogle Scholar
  164. Kai Shu, Suhang Wang, and Huan Liu. 2018. Understanding user profiles on social media for fake news detection. In Proceedings of the 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR’18). IEEE, 430--435.Google ScholarGoogle ScholarCross RefCross Ref
  165. Kai Shu, Suhang Wang, and Huan Liu. 2019. Beyond news contents: The role of social context for fake news detection. In Proceedings of the 12th ACM International Conference on Web Search and Data Mining. ACM, 312--320.Google ScholarGoogle ScholarDigital LibraryDigital Library
  166. Bernd Carsten Stahl. 2006. On the difference or equality of information, misinformation, and disinformation: A critical research perspective. Inf. Sci. 9 (2006), 83--96.Google ScholarGoogle Scholar
  167. Massimo Stella, Emilio Ferrara, and Manlio De Domenico. 2018. Bots increase exposure to negative and inflammatory content in online social systems. Proceedings of the National Academy of Sciences 115, 49 (2018), 12435--12440.Google ScholarGoogle ScholarCross RefCross Ref
  168. S. Shyam Sundar. 1998. Effect of source attribution on perception of online news stories. Journal. Mass Commun. Quart. 75, 1 (1998), 55--68.Google ScholarGoogle ScholarCross RefCross Ref
  169. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. Arxiv Preprint Arxiv:1312.6199 (2013).Google ScholarGoogle Scholar
  170. Eugenio Tacchini, Gabriele Ballarin, Marco L. Della Vedova, Stefano Moret, and Luca de Alfaro. 2017. Some like it hoax: Automated fake news detection in social networks. Arxiv Preprint Arxiv:1704.07506 (2017).Google ScholarGoogle Scholar
  171. Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. 2015. Line: Large-scale information network embedding. In Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 1067--1077.Google ScholarGoogle ScholarDigital LibraryDigital Library
  172. Jeffrey E. Thomas. 1986. Statements of fact, statements of opinion, and the first amendment. Calif. L. Rev. 74 (1986), 1001.Google ScholarGoogle ScholarCross RefCross Ref
  173. Laura Tolosi, Andrey Tagarev, and Georgi Georgiev. 2016. An analysis of event-agnostic features for rumour classification in twitter. In Proceedings of the 10th International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar
  174. Sebastian Tschiatschek, Adish Singla, Manuel Gomez Rodriguez, Arpit Merchant, and Andreas Krause. 2018. Fake news detection in social networks via crowd signals. In Companion of the The Web Conference 2018 on The Web Conference 2018. International World Wide Web Conferences Steering Committee, 517--524.Google ScholarGoogle ScholarDigital LibraryDigital Library
  175. Nguyen Vo and Kyumin Lee. 2018. The rise of guardians: Fact-checking url recommendation to combat fake news. In Proceedings of the 41st International ACM SIGIR Conference on Research 8 Development in Information Retrieval. ACM, 275--284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  176. Svitlana Volkova and Jin Yea Jang. 2018. Misleading or falsification: Inferring deceptive strategies and types in online news and social media. In Companion of the The Web Conference 2018 on The Web Conference 2018. International World Wide Web Conferences Steering Committee, 575--583.Google ScholarGoogle ScholarDigital LibraryDigital Library
  177. Luis Von Ahn. 2008. Human computation. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. IEEE Computer Society, 1--2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  178. Luis Von Ahn, Benjamin Maurer, Colin McMillen, David Abraham, and Manuel Blum. 2008. recaptcha: Human-based character recognition via web security measures. Science 321, 5895 (2008), 1465--1468.Google ScholarGoogle Scholar
  179. Soroush Vosoughi, Deb Roy, and Sinan Aral. 2018. The spread of true and false news online. Science 359, 6380 (2018), 1146--1151.Google ScholarGoogle Scholar
  180. William Yang Wang. 2017. “Liar, liar pants on fire”: A new benchmark dataset for fake news detection. Arxiv Preprint Arxiv:1705.00648 (2017).Google ScholarGoogle Scholar
  181. Xiting Wang, Yiru Chen, Jie Yang, Le Wu, Zhengtao Wu, and Xing Xie. 2018. A reinforcement learning framework for explainable recommendation. In Proceedings of the 2018 IEEE International Conference on Data Mining (ICDM). IEEE, 587--596.Google ScholarGoogle ScholarCross RefCross Ref
  182. Yaqing Wang, Fenglong Ma, Zhiwei Jin, Ye Yuan, Guangxu Xun, Kishlay Jha, Lu Su, and Jing Gao. 2018. Eann: Event adversarial neural networks for multi-modal fake news detection. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery 8 Data Mining. ACM, 849--857.Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. Yaqing Wang, Quanming Yao, James T. Kwok, and Lionel M. Ni. 2020. Generalizing from a few examples: A survey on few-shot learning. ACM Comput. Surv. 53, 3 (2020), 63.Google ScholarGoogle ScholarDigital LibraryDigital Library
  184. Jason Weston, Frédéric Ratle, Hossein Mobahi, and Ronan Collobert. 2012. Deep learning via semi-supervised embedding. In Neural Networks: Tricks of the Trade. Springer, 639--655.Google ScholarGoogle Scholar
  185. Anita Williams Woolley, Christopher F. Chabris, Alex Pentland, Nada Hashmi, and Thomas W. Malone. 2010. Evidence for a collective intelligence factor in the performance of human groups. Science 330, 6004 (2010), 686--688.Google ScholarGoogle ScholarCross RefCross Ref
  186. Ke Wu, Song Yang, and Kenny Q. Zhu. 2015. False rumors detection on sina weibo by propagation structures. In Proceedings of the 2015 IEEE 31st International Conference on Data Engineering. IEEE, 651--662.Google ScholarGoogle Scholar
  187. Liang Wu, Jundong Li, Xia Hu, and Huan Liu. 2017. Gleaning wisdom from the past: Early detection of emerging rumors in social media. In Proceedings of the 2017 SIAM International Conference on Data Mining. SIAM, 99--107.Google ScholarGoogle ScholarCross RefCross Ref
  188. Liang Wu and Huan Liu. 2018. Tracing fake-news footprints: Characterizing social media messages by how they propagate. In Proceedings of the 11th ACM International Conference on Web Search and Data Mining. ACM, 637--645.Google ScholarGoogle ScholarDigital LibraryDigital Library
  189. Sihong Xie, Guan Wang, Shuyang Lin, and Philip S. Yu. 2012. Review spam detection via temporal pattern discovery. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 823--831.Google ScholarGoogle Scholar
  190. Fan Yang, Shiva K. Pentyala, Sina Mohseni, Mengnan Du, Hao Yuan, Rhema Linder, Eric D. Ragan, Shuiwang Ji, and Xia Ben Hu. 2019. XFake: Explainable fake news detector with visualizations. In Proceedings of the World Wide Web Conference. ACM, 3600--3604.Google ScholarGoogle ScholarDigital LibraryDigital Library
  191. Shuo Yang, Kai Shu, Suhang Wang, Renjie Gu, Fan Wu, and Huan Liu. 2019. Unsupervised fake news detection on social media: A generative approach. In Proceedings of 33rd AAAI Conference on Artificial Intelligence.Google ScholarGoogle ScholarDigital LibraryDigital Library
  192. Yang Yang, Lei Zheng, Jiawei Zhang, Qingcai Cui, Zhoujun Li, and Philip S. Yu. 2018. TI-CNN: Convolutional neural networks for fake news detection. Arxiv Preprint Arxiv:1806.00749 (2018).Google ScholarGoogle Scholar
  193. Li’ang Yin, Jianhua Han, Weinan Zhang, and Yong Yu. 2017. Aggregating crowd wisdoms with label-aware autoencoders. In Proceedings of the 26th International Joint Conference on Artificial Intelligence. AAAI Press, 1325--1331.Google ScholarGoogle ScholarCross RefCross Ref
  194. Feng Yu, Qiang Liu, Shu Wu, Liang Wang, and Tieniu Tan. 2019. Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts. Comput. Secur. 83 (2019), 106--121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  195. Feng Yu, Qiang Liu, Shu Wu, Liang Wang, and Tieniu Tan. 2019. Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts. Computer and Security 83 (2019), 106--121.Google ScholarGoogle ScholarCross RefCross Ref
  196. Hengtong Zhang, Yaliang Li, Fenglong Ma, Jing Gao, and Lu Su. 2018. TextTruth: An unsupervised approach to discover trustworthy information from multi-sourced text data. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery 8 Data Mining. ACM, 2729--2737.Google ScholarGoogle ScholarDigital LibraryDigital Library
  197. Qiang Zhang, Aldo Lipani, Shangsong Liang, and Emine Yilmaz. 2019. Reply-aided detection of misinformation via bayesian deep learning. In Proceedings of the World Wide Web Conference. ACM, 2333--2343.Google ScholarGoogle ScholarDigital LibraryDigital Library
  198. Yongfeng Zhang and Xu Chen. 2018. Explainable recommendation: A survey and new perspectives. Arxiv Preprint Arxiv:1804.11192 (2018).Google ScholarGoogle Scholar
  199. Zhe Zhao, Paul Resnick, and Qiaozhu Mei. 2015. Enquiring minds: Early detection of rumors in social media from enquiry posts. In Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 1395--1405.Google ScholarGoogle ScholarDigital LibraryDigital Library
  200. Shi Zhi, Yicheng Sun, Jiayi Liu, Chao Zhang, and Jiawei Han. 2017. ClaimVerif: A real-time claim verification system using the web and fact databases. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. ACM, 2555--2558.Google ScholarGoogle ScholarDigital LibraryDigital Library
  201. Xinyi Zhou and Reza Zafarani. 2018. Fake News: A survey of research, detection methods, and opportunities. Arxiv Preprint Arxiv:1812.00315 (2018).Google ScholarGoogle Scholar
  202. Zhixuan Zhou, Huankang Guan, Meghana Moorthy Bhat, and Justin Hsu. 2019. Fake news detection via NLP is vulnerable to adversarial attacks. Arxiv Preprint Arxiv:1901.09657 (2019).Google ScholarGoogle Scholar
  203. Cliff C. Zou, Weibo Gong, Don Towsley, and Lixin Gao. 2005. The monitoring and early detection of internet worms. IEEE/ACM Trans. Netw. 13, 5 (2005), 961--974.Google ScholarGoogle ScholarDigital LibraryDigital Library
  204. Arkaitz Zubiaga, Ahmet Aker, Kalina Bontcheva, Maria Liakata, and Rob Procter. 2018. Detection and resolution of rumours in social media: A survey. ACM Comput. Surv. 51, 2 (2018), 32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  205. Arkaitz Zubiaga, Maria Liakata, and Rob Procter. 2016. Learning reporting dynamics during breaking news for rumour detection in social media. Arxiv Preprint Arxiv:1610.07363 (2016).Google ScholarGoogle Scholar
  206. Arkaitz Zubiaga, Maria Liakata, and Rob Procter. 2017. Exploiting context for rumour detection in social media. In International Conference on Social Informatics. Springer, 109--123.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. The Future of False Information Detection on Social Media: New Perspectives and Trends

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 53, Issue 4
        July 2021
        831 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3410467
        Issue’s Table of Contents

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 July 2020
        • Online AM: 7 May 2020
        • Accepted: 1 April 2020
        • Revised: 1 March 2020
        • Received: 1 August 2019
        Published in csur Volume 53, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • survey
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format