Editorial Notes
NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2021 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
ABSTRACT
The paper is about the detection of unauthenticated news using Machine-learning methods with different algorithms. There is lot of scope to check the reality of the news received from various sources like websites, blogs, e-content. To identify the fake news, there is a need of some application in real time. Many methods were proposed earlier to observe fake news such as style-based, propagation-based and user-based. Automatic fake news detection application can be generated using natural language processing, information retrieval techniques, as well as graph theory. Language modeling is used to predict the missing or next word in a sentence based on the context. It is believed that mainstream media platforms are publishing fake news to grasp the attention of readers; most likely, it is done to increase the number of visitors on that particular page so that with an increasing number of visitors the page could claim more advertisement. This paper proposes an efficient method to detect fake news with better accuracy by using the available data set to detect the news is FAKE or REAL. Various methods are used for collecting the data and the data mining techniques are applied to clean and visualize it. Data mining helps to differentiate between the qualities of data depending upon its properties. The performance of detecting news only from the body of news is not sufficient but also social engagements should be considered. The objective of the work is to provide end-users with a robust solution so that they can figure out phishy and misguiding information. This technique combines the title and the body of the news to predict fake news more efficiently. The application is concerned with finding a result that could be used to identify fake news to help users.
- Vasu Agarwal, H. Parveen Sultana, Srijan Malhotra, and Amitrajit Sarkar. 2019. Analysis of Classifiers for Fake News Detection. Procedia Computer Science 165 (2019), 377–383. https://doi.org/10.1016/j.procs.2020.01.035Google ScholarDigital Library
- Sajjad Ahmed, Knut Hinkelmann, and Flavio Corradini. 2020. Development of Fake News Model Using Machine Learning through Natural Language Processing. International Journal of Computer and Information Engineering 14, 12 (Nov. 2020), 454–460. https://publications.waset.org/10011624/development-of-fake-news-model-using-machine-learning-through-natural-language-processingGoogle Scholar
- Monther Aldwairi and Ali Alwahedi. 2018. Detecting Fake News in Social Media Networks. Procedia Computer Science 141 (2018), 215–222. https://doi.org/10.1016/j.procs.2018.10.171Google ScholarCross Ref
- S.A. Aljawarneh, V. Radhakrishna, and J.W. Atwood. 2018. Ultimate - Unearthing latent time profiled temporal associations. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280025 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.Google ScholarDigital Library
- S.A. Aljawarneh, V. Radhakrishna, and J.W. Atwood. 2020. Ultimate: Unearthing Latent Time Profiled Temporal Associations. Foundations of Science 25, 4 (2020), 1147–1171. https://doi.org/10.1007/s10699-019-09594-8Google ScholarCross Ref
- S.A. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2018. Extending the Gaussian membership function for finding similarity between temporal patterns. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–6. https://doi.org/10.1109/ICEMIS.2017.8273100 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google Scholar
- S. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2018. Vrksha – A novel multi-tree based sequential approach for seasonal pattern mining. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234735 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.Google ScholarDigital Library
- S. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2019. Nirnayam - Fusion of iterative rule based decisions to build decision trees for efficient classification. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330458 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.Google ScholarDigital Library
- S.A. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2020. VRKSHA: a novel tree structure for time-profiled temporal association mining. Neural Computing and Applications 32, 21 (2020), 16337–16365. https://doi.org/10.1007/s00521-018-3776-7Google ScholarDigital Library
- S.A. Aljawarneh, V. Radhakrishna, and G.R. Kumar. 2018. A fuzzy measure for intrusion and anomaly detection. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–6. https://doi.org/10.1109/ICEMIS.2017.8273113 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google Scholar
- S. Aljawarneh, V. Radhakrishna, and G.R. Kumar. 2019. An imputation measure for data imputation and disease classification of medical datasets. AIP Conference Proceedings 2146 (2019). https://doi.org/10.1063/1.5123688 Conference of 1st International Conference on Key Enabling Technologies, KEYTECH 2019 ; Conference Date: 24 April 2019 Through 26 April 2019; Conference Code:150894.Google Scholar
- S. Aljawarneh, V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A similarity measure for temporal pattern discovery in time series data generated by IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745355 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google Scholar
- S. Aljawarneh, V. Radhakrishna, and G.S. Reddy. 2018. MANTRA - A novel imputation measure for disease classification and prediction. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280021 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.Google ScholarDigital Library
- S.A. Aljawarneh and R. Vangipuram. 2020. GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. Journal of Supercomputing 76, 6 (2020), 4376–4413. https://doi.org/10.1007/s11227-018-2397-3Google ScholarDigital Library
- S.A. Aljawarneh, R. Vangipuram, V.K. Puligadda, and J. Vinjamuri. 2017. G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things. Future Generation Computer Systems 74 (2017), 430–443. https://doi.org/10.1016/j.future.2017.01.013Google ScholarDigital Library
- Shadi A. Aljawarneh, Ali Alawneh, and Reem Jaradat. 2017. Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems 74 (Sept. 2017), 385–392. https://doi.org/10.1016/j.future.2016.10.005Google ScholarDigital Library
- Shadi A. Aljawarneh, Raja A. Moftah, and Abdelsalam M. Maatuk. 2016. Investigations of automatic methods for detecting the polymorphic worms signatures. Future Generation Computer Systems 60 (July 2016), 67–77. https://doi.org/10.1016/j.future.2016.01.020Google ScholarDigital Library
- Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. Comput. Surveys 41, 3 (July 2009), 1–58. https://doi.org/10.1145/1541880.1541882Google ScholarDigital Library
- A. Cheruvu and V. Radhakrishna. 2016. Estimating temporal pattern bounds using negative support computations. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745352 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google Scholar
- A. Cheruvu, V. Radhakrishna, and N. Rajasekhar. 2018. Using normal distribution to retrieve temporal associations by Euclidean distance. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–3. https://doi.org/10.1109/ICEMIS.2017.8273101 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google Scholar
- Nadia K. Conroy, Victoria L. Rubin, and Yimin Chen. 2015. Automatic deception detection: Methods for finding fake news. Proceedings of the Association for Information Science and Technology 52, 1 (Jan. 2015), 1–4. https://doi.org/10.1002/pra2.2015.145052010082Google ScholarCross Ref
- Rajesh Kumar Gunupudi, Mangathayaru Nimmala, Narsimha Gugulothu, and Suresh Reddy Gali. 2017. CLAPP: A self constructing feature clustering approach for anomaly detection. Future Generation Computer Systems 74 (2017), 417–429. https://doi.org/10.1016/j.future.2016.12.040Google ScholarCross Ref
- Yaser Khamayseh, Wail Mardini, Shadi Aljawarneh, and Muneer Bani Yassein. 2015. Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture. International Journal of Information and Communication Technology Education 11, 1 (Jan. 2015), 60–74. https://doi.org/10.4018/ijicte.2015010104Google ScholarDigital Library
- Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An Approach for Intrusion Detection Using Text Mining Techniques. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 63, 6 pages. https://doi.org/10.1145/2832987.2833076Google ScholarDigital Library
- Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An Improved K-Means Clustering Algorithm for Intrusion Detection Using Gaussian Function. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 69, 7 pages. https://doi.org/10.1145/2832987.2833082Google ScholarDigital Library
- G. Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2019. Similarity Function for Intrusion Detection. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 28, 4 pages. https://doi.org/10.1145/3330431.3330460Google ScholarDigital Library
- Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, and Aravind Cheruvu. 2018. Feature Clustering for Anomaly Detection Using Improved Fuzzy Membership Function. In Proceedings of the Fourth International Conference on Engineering and MIS 2018(Istanbul, Turkey) (ICEMIS ’18). Association for Computing Machinery, New York, NY, USA, Article 35, 9 pages. https://doi.org/10.1145/3234698.3234733Google ScholarDigital Library
- Arun Nagaraja, Shadi Aljawarneh, and Prabhakara H. S. 2018. PAREEKSHA: a machine learning approach for intrusion and anomaly detection. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems. ACM, Madrid Spain, 1–6. https://doi.org/10.1145/3279996.3280032Google ScholarDigital Library
- Arun Nagaraja, Uma Boregowda, Khalaf Khatatneh, Radhakrishna Vangipuram, Rajasekhar Nuvvusetty, and V. Sravan Kiran. 2020. Similarity Based Feature Transformation for Network Anomaly Detection. IEEE Access 8(2020), 39184–39196. https://doi.org/10.1109/ACCESS.2020.2975716Google ScholarCross Ref
- A. Nagaraja, U. Boregowda, K. Khatatneh, R. Vangipuram, R. Nuvvusetty, and V. Sravan Kiran. 2020. Similarity Based Feature Transformation for Network Anomaly Detection. IEEE Access 8(2020), 39184–39196. https://doi.org/10.1109/ACCESS.2020.2975716Google ScholarCross Ref
- Arun Nagaraja, V. Sravan Kiran, Prabhakara H. S, and N. Rajasekhar. 2018. A membership function for intrusion and anomaly detection of low frequency attacks. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems. ACM, Madrid Spain, 1–6. https://doi.org/10.1145/3279996.3280031Google ScholarDigital Library
- Arun Nagaraja and T. Satish Kumar. 2018. An Extensive Survey on Intrusion Detection- Past, Present, Future. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 - ICEMIS ’18. ACM Press, Istanbul, Turkey, 1–9. https://doi.org/10.1145/3234698.3234743Google ScholarDigital Library
- Arun Nagaraja and T. Satish Kumar. 2018. A Membership Function for Feature Clustering Based Network Intrusion and Anomaly Detection. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 - ICEMIS ’18. ACM Press, Istanbul, Turkey, 1–6. https://doi.org/10.1145/3234698.3234720Google ScholarDigital Library
- Arun Nagaraja, Nimmala Mangathayaru, N Rajashekar, and T Satish Kumar. 2016. A survey on routing techniques for transmission of packets in networks. In 2016 International Conference on Engineering & MIS (ICEMIS). IEEE, Agadir, Morocco, 1–6. https://doi.org/10.1109/ICEMIS.2016.7745349Google ScholarCross Ref
- Arun Nagaraja and B. Uma. 2019. A generalized research study on distance measures, learning algorithms and datasets. In Proceedings of the 5th International Conference on Engineering and MIS. ACM, Astana Kazakhstan, 1–7. https://doi.org/10.1145/3330431.3330466Google ScholarDigital Library
- Arun Nagaraja and B. Uma. 2019. Intrusion detection using dimensionality reduced soft matrix. In Proceedings of the 5th International Conference on Engineering and MIS. ACM, Astana Kazakhstan, 1–7. https://doi.org/10.1145/3330431.3330465Google ScholarDigital Library
- Arun Nagaraja, B. Uma, and Rajesh kumar Gunupudi. 2020. UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation. Foundations of Science 25, 4 (Dec. 2020), 1049–1075. https://doi.org/10.1007/s10699-019-09589-5Google ScholarCross Ref
- PhridviRaj, Chintakindi Srinivas, and C.V. GuruRao. 2014. Clustering Text Data Streams – A Tree based Approach with Ternary Function and Ternary Feature Vector. Procedia Computer Science 31 (2014), 976–984. https://doi.org/10.1016/j.procs.2014.05.350 2nd International Conference on Information Technology and Quantitative Management, ITQM 2014.Google ScholarCross Ref
- M.S.B. Phridviraj, Vangipuram RadhaKrishna, Chintakindi Srinivas, and C.V. GuruRao. 2015. A Novel Gaussian Based Similarity Measure for Clustering Customer Transactions Using Transaction Sequence Vector. Procedia Technology 19(2015), 880–887. https://doi.org/10.1016/j.protcy.2015.02.126 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, 9-10 October 2014, Tirgu Mures, Romania.Google ScholarCross Ref
- M.S.B. Phridviraj, V. Radhakrishna, K. Vinay Kumar, and C.V. GuruRao. 2015. A novel similarity measure for clustering customer transactions using ternary sequence vector. Advances in Intelligent Systems and Computing 347 (2015), 297–308. https://doi.org/10.1007/978-3-319-18476-0_30 Conference of 4th Computer Science On-line Conference, CSOC 2015 ; Conference Date: 27 April 2015 Through 30 April 2015; Conference Code:135449.Google ScholarCross Ref
- M. S. B. PhridviRaj and C. V. Guru Rao. 2015. An Approach for Clustering Text Data Streams Using K-Means and Ternary Feature Vector Based Similarity Measure. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 68, 6 pages. https://doi.org/10.1145/2832987.2833081Google ScholarDigital Library
- M. S. B. Phridviraj and C. V. Guru Rao. 2019. A Novel Approach for Unsupervised Learning of Transaction Data. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 32, 5 pages. https://doi.org/10.1145/3330431.3330464Google ScholarDigital Library
- Malik Qasaimeh, Raad S. Al-Qassas, Fida Mohammad, and Shadi Aljawarneh. 2020. A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion. Recent Advances in Computer Science and Communications 13, 3 (Aug. 2020), 435–445. https://doi.org/10.2174/2213275912666181214152207Google ScholarCross Ref
- V. RadhaKrishna. 2015. Design and analysis of novel kernel measure for software fault localization. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833042 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.Google ScholarDigital Library
- V. Radhakrishna, S. Aljawarneh, and A. Cheruvu. 2018. Sequential approach for mining of temporal itemsets. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234731 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.Google ScholarDigital Library
- V. Radhakrishna, S.A. Aljawarneh, V. Janaki, and P.V. Kumar. 2018. Looking into the possibility for designing normal distribution based dissimilarity measure to discover time profiled association patterns. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–5. https://doi.org/10.1109/ICEMIS.2017.8273097 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google Scholar
- V. Radhakrishna, S. Aljawarneh, P.V. Kumar, and A. Cheruvu. 2018. Kaala VRKSHA - Extending VRKSHA for time profiled temporal association mining. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280026 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.Google ScholarDigital Library
- V. Radhakrishna, S.A. Aljawarneh, P.V. Kumar, and K.-K.R. Choo. 2018. A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Computing 22, 6 (2018), 1903–1919. https://doi.org/10.1007/s00500-016-2445-yGoogle ScholarDigital Library
- V. Radhakrishna, S.A. Aljawarneh, P.V. Kumar, and V. Janaki. 2018. A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. Future Generation Computer Systems 83 (2018), 582–595. https://doi.org/10.1016/j.future.2017.03.016Google ScholarCross Ref
- V. Radhakrishna, S. Aljawarneh, P.V. Kumar, V. Janaki, and A. Cheruvu. 2019. Discovery of time profiled temporal patterns. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330459 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.Google ScholarDigital Library
- V. Radhakrishna, S.A. Aljawarneh, P. Veereswara Kumar, and V. Janaki. 2019. ASTRA - A Novel interest measure for unearthing latent temporal associations and trends through extending basic gaussian membership function. Multimedia Tools and Applications 78, 4 (2019), 4217–4265. https://doi.org/10.1007/s11042-017-5280-yGoogle ScholarDigital Library
- V. Radhakrishna, V. Janaki, S. Aljawarneh, P.V. Kumar, and A. Cheruvu. 2019. Tree based data fusion approach for mining temporal patterns. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330463 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.Google ScholarDigital Library
- V. Radhakrishna, P.V. Kumar, S.A. Aljawarneh, and V. Janaki. 2018. Design and analysis of a novel temporal dissimilarity measure using Gaussian membership function. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–5. https://doi.org/10.1109/ICEMIS.2017.8273098 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google Scholar
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2015. An approach for mining similarity profiled temporal association patterns using Gaussian based dissimilarity measure. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833069 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.Google ScholarDigital Library
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2015. A temporal pattern mining based approach for intrusion detection using similarity measure. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833077 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.Google ScholarDigital Library
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. An approach for mining similar temporal association patterns in single database scan. Smart Innovation, Systems and Technologies 51 (2016), 607–617. https://doi.org/10.1007/978-3-319-30927-9_60 Conference of 1st International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2015 ; Conference Date: 28 November 2015 Through 29 November 2015; Conference Code:174689.Google ScholarCross Ref
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A computationally optimal approach for extracting similar temporal patterns. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745344 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google Scholar
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Looking into the possibility of novel dissimilarity measure to discover similarity profiled temporal association patterns in IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745353 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google Scholar
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Mining of outlier temporal patterns. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745343 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google Scholar
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Mining outlier temporal association patterns. ACM International Conference Proceeding Series 04-05-March-2016 (2016). https://doi.org/10.1145/2905055.2905320 Conference of 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016 ; Conference Date: 4 March 2016 Through 5 March 2016; Conference Code:123477.Google ScholarDigital Library
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A novel approach to discover similar temporal association patterns in a single database scan, Krishnan N. Karthikeyan M. (Ed.). 2015 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015(2016). https://doi.org/10.1109/ICCIC.2015.7435809 Conference of 6th IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015 ; Conference Date: 10 December 2015 Through 12 December 2015; Conference Code:120030.Google Scholar
- V. Radhakrishna, P. Kumar, and V. Janaki. 2016. A novel similar temporal system call pattern mining for efficient intrusion detection. Journal of Universal Computer Science 22, 4 (2016), 475–493. https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978414602&partnerID=40&md5=6bfa14df22045e36f5bf23e839dca48bGoogle Scholar
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A single database scan approach for mining temporally similar association patterns. ACM International Conference Proceeding Series 04-05-March-2016 (2016). https://doi.org/10.1145/2905055.2905287 Conference of 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016 ; Conference Date: 4 March 2016 Through 5 March 2016; Conference Code:123477.Google ScholarDigital Library
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2017. A computationally efficient approach for mining similar temporal patterns. Advances in Intelligent Systems and Computing 576 (2017), 197–208. https://doi.org/10.1007/978-3-319-58088-3_19 Conference of 22nd International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Swarm Intelligence, Fuzzy Logic, Neural Networks, Chaos, Bayesian Methods, Intelligent Image Processing, Bio-Inspired Robotics, MENDEL 2016 ; Conference Date: 8 June 2016 Through 10 June 2016; Conference Code:192169.Google ScholarCross Ref
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2018. Krishna sudarsana – A Z-space similarity measure. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234742 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.Google ScholarDigital Library
- V. Radhakrishna, P.V. Kumar, and V. Janaki. 2019. GANDIVA: Temporal pattern tree for similarity profiled association mining. International Journal of Information Technology and Web Engineering 14, 4(2019), 1–18. https://doi.org/10.4018/IJITWE.2019100101Google ScholarCross Ref
- V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2016. A computationally efficient approach for temporal pattern mining in IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745354 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google Scholar
- V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2016. A similarity measure for outlier detection in timestamped temporal databases. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745347 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google Scholar
- V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2018. GANDIVA - Time profiled temporal pattern tree. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234734 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.Google ScholarDigital Library
- V. Radhakrishna, P.V. Kumar, V. Janaki, and N. Rajasekhar. 2017. Estimating prevalence bounds of temporal association patterns to discover temporally similar patterns. Advances in Intelligent Systems and Computing 576 (2017), 209–220. https://doi.org/10.1007/978-3-319-58088-3_20 Conference of 22nd International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Swarm Intelligence, Fuzzy Logic, Neural Networks, Chaos, Bayesian Methods, Intelligent Image Processing, Bio-Inspired Robotics, MENDEL 2016 ; Conference Date: 8 June 2016 Through 10 June 2016; Conference Code:192169.Google ScholarCross Ref
- V. Radhakrishna, P. V. Kumar, and V. Janaki. 2015. A Temporal Pattern Mining Based Approach for Intrusion Detection Using Similarity Measure. In Proceedings of the The International Conference on Engineering & MIS 2015 - ICEMIS ’15. ACM Press, Istanbul, Turkey, 1–8. https://doi.org/10.1145/2832987.2833077Google ScholarDigital Library
- Vangipuram Radhakrishna, Gali Suresh Reddy, Puligadda Veereswara Kumar, and Vinjamuri Janaki. 2021. Challenge Paper: The Vision for Time Profiled Temporal Association Mining. Journal of Data and Information Quality 13, 2 (May 2021), 1–8. https://doi.org/10.1145/3404198Google ScholarDigital Library
- Vangipuram Radhakrishna, Chintakindi Srinivas, and C. V. GuruRao. 2014. A Modified Gaussian Similarity Measure for Clustering Software Components and Documents. In Proceedings of the International Conference on Information Systems and Design of Communication (Lisbon, Portugal) (ISDOC ’14). Association for Computing Machinery, New York, NY, USA, 99–104. https://doi.org/10.1145/2618168.2618184Google ScholarDigital Library
- V. Radhakrishna, P. Veereswara Kumar, and V. Janaki. 2018. SRIHASS - a similarity measure for discovery of hidden time profiled temporal associations. Multimedia Tools and Applications 77, 14 (2018), 17643–17692. https://doi.org/10.1007/s11042-017-5185-9Google ScholarDigital Library
- Julio C. S. Reis, Andre Correia, Fabricio Murai, Adriano Veloso, Fabricio Benevenuto, and Erik Cambria. 2019. Supervised Learning for Fake News Detection. IEEE Intelligent Systems 34, 2 (March 2019), 76–81. https://doi.org/10.1109/MIS.2019.2899143Google ScholarDigital Library
- Victoria L. Rubin, Yimin Chen, and Nadia K. Conroy. 2015. Deception detection for news: Three types of fakes. Proceedings of the Association for Information Science and Technology 52, 1 (Jan. 2015), 1–4. https://doi.org/10.1002/pra2.2015.145052010083Google ScholarCross Ref
- Peining Shi, Zhiyong Zhang, and Kim-Kwang Raymond Choo. 2019. Detecting Malicious Social Bots Based on Clickstream Sequences. IEEE Access 7(2019), 28855–28862. https://doi.org/10.1109/ACCESS.2019.2901864Google ScholarCross Ref
- Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2013. Clustering Software Components for Program Restructuring and Component Reuse Using Hybrid XOR Similarity Function. AASRI Procedia 4(2013), 319–328. https://doi.org/10.1016/j.aasri.2013.10.047 2013 AASRI Conference on Intelligent Systems and Control.Google ScholarCross Ref
- Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2014. Clustering and Classification of Software Component for Efficient Component Retrieval and Building Component Reuse Libraries. Procedia Computer Science 31 (2014), 1044–1050. https://doi.org/10.1016/j.procs.2014.05.358 2nd International Conference on Information Technology and Quantitative Management, ITQM 2014.Google ScholarCross Ref
- Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2014. Clustering Software Components for Program Restructuring and Component Reuse Using Hybrid XNOR Similarity Function. Procedia Technology 12(2014), 246–254. https://doi.org/10.1016/j.protcy.2013.12.482 The 7th International Conference Interdisciplinarity in Engineering, INTER-ENG 2013, 10-11 October 2013, Petru Maior University of Tirgu Mures, Romania.Google ScholarCross Ref
- Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2015. Software Component Clustering and Classification Using Novel Similarity Measure. Procedia Technology 19(2015), 866–873. https://doi.org/10.1016/j.protcy.2015.02.124 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, 9-10 October 2014, Tirgu Mures, Romania.Google ScholarCross Ref
- Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2013. Clustering Software Components for Component Reuse and Program Restructuring. In Proceedings of the Second International Conference on Innovative Computing and Cloud Computing(Wuhan, China) (ICCC ’13). Association for Computing Machinery, New York, NY, USA, 261–266. https://doi.org/10.1145/2556871.2556933Google ScholarDigital Library
- Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2013. Clustering Software Components for Component Reuse and Program Restructuring. In Proceedings of the Second International Conference on Innovative Computing and Cloud Computing(Wuhan, China) (ICCC ’13). Association for Computing Machinery, New York, NY, USA, 261–266. https://doi.org/10.1145/2556871.2556933Google ScholarDigital Library
- Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2015. Clustering Software Project Components for Strategic Decisions and Building Reuse Libraries. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 62, 5 pages. https://doi.org/10.1145/2832987.2833075Google ScholarDigital Library
- Chintakindi Srinivas and C. V. Guru Rao. 2015. A Feature Vector Based Approach for Software Component Clustering and Reuse Using K-Means. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 67, 5 pages. https://doi.org/10.1145/2832987.2833080Google ScholarDigital Library
- Chintakindi Srinivas and C. V. Guru Rao. 2019. A Novel Approach for Unsupervised Learning of Software Components. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 29, 6 pages. https://doi.org/10.1145/3330431.3330461Google ScholarDigital Library
- Kelly Stahl. 2018. Fake news detection in social media. https://www.semanticscholar.org/paper/Fake-news-detection-in-social-media-Stahl/b202b4b7124b774391109dc47a33e17224b12295Google Scholar
- R. Vangipuram, R.K. Gunupudi, V.K. Puligadda, and J. Vinjamuri. 2020. A machine learning approach for imputation and anomaly detection in IoT environment. Expert Systems 37, 5 (2020). https://doi.org/10.1111/exsy.12556Google Scholar
- R. Vangipuram, P.V. Kumar, V. Janaki, S.A. Aljawarneh, J.A. Lara, and K. Khatatneh. 2020. Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns. Foundations of Science 25, 4 (2020), 1027–1048. https://doi.org/10.1007/s10699-019-09590-yGoogle ScholarCross Ref
- Vinjamuri Janaki Vangipuram Radhakrishna, Puligadda Veereswara Kumar. 2016. (V. Radhakrishna, P. Kumar, V. Janaki) A Novel Similar Temporal System Call Pattern Mining for EfficientIntrusion Detection. http://www.jucs.org/jucs_22_4/a_novel_similar_temporalGoogle Scholar
- Kuai Xu, Feng Wang, Haiyan Wang, and Bo Yang. 2020. Detecting fake news over online social media via domain reputations and content understanding. Tsinghua Science and Technology 25, 1 (Feb. 2020), 20–27. https://doi.org/10.26599/TST.2018.9010139Google ScholarCross Ref
- Muneer Bani Yassien, Shadi A. Aljawarneh, Mohammad Eyadat, and Eman Eaydat. 2021. Routing protocol for low power and lossy network–load balancing time-based. International Journal of Machine Learning and Cybernetics (Jan. 2021). https://doi.org/10.1007/s13042-020-01261-wGoogle ScholarCross Ref
- Xinyi Zhou and Reza Zafarani. 2020. A Survey of Fake News: Fundamental Theories, Detection Methods, and Opportunities. Comput. Surveys 53, 5 (Oct. 2020), 1–40. https://doi.org/10.1145/3395046Google ScholarDigital Library
Index Terms
- Fake News Detection Using Machine Learning Methods
Recommendations
Fake News Early Detection: A Theory-driven Model
Field NotesMassive dissemination of fake news and its potential to erode democracy has increased the demand for accurate fake news detection. Recent advancements in this area have proposed novel techniques that aim to detect fake news by exploring how it ...
A survey on fake news and rumour detection techniques
AbstractFalse or unverified information spreads just like accurate information on the web, thus possibly going viral and influencing the public opinion and its decisions. Fake news and rumours represent the most popular forms of false and ...
Multi-Label Fake News Detection using Multi-layered Supervised Learning
ICCAE 2019: Proceedings of the 2019 11th International Conference on Computer and Automation EngineeringRapid spreading of misinformation is a growing worldwide concern as it has the capacity to greatly influence individual reputation and societal behavior. The consequences of unchecked spreading of misinformation can not only vary from political to ...
Comments