skip to main content
10.1145/3460620.3460753acmotherconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

Fake News Detection Using Machine Learning Methods

Published:04 June 2021Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2021 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

ABSTRACT

The paper is about the detection of unauthenticated news using Machine-learning methods with different algorithms. There is lot of scope to check the reality of the news received from various sources like websites, blogs, e-content. To identify the fake news, there is a need of some application in real time. Many methods were proposed earlier to observe fake news such as style-based, propagation-based and user-based. Automatic fake news detection application can be generated using natural language processing, information retrieval techniques, as well as graph theory. Language modeling is used to predict the missing or next word in a sentence based on the context. It is believed that mainstream media platforms are publishing fake news to grasp the attention of readers; most likely, it is done to increase the number of visitors on that particular page so that with an increasing number of visitors the page could claim more advertisement. This paper proposes an efficient method to detect fake news with better accuracy by using the available data set to detect the news is FAKE or REAL. Various methods are used for collecting the data and the data mining techniques are applied to clean and visualize it. Data mining helps to differentiate between the qualities of data depending upon its properties. The performance of detecting news only from the body of news is not sufficient but also social engagements should be considered. The objective of the work is to provide end-users with a robust solution so that they can figure out phishy and misguiding information. This technique combines the title and the body of the news to predict fake news more efficiently. The application is concerned with finding a result that could be used to identify fake news to help users.

References

  1. Vasu Agarwal, H. Parveen Sultana, Srijan Malhotra, and Amitrajit Sarkar. 2019. Analysis of Classifiers for Fake News Detection. Procedia Computer Science 165 (2019), 377–383. https://doi.org/10.1016/j.procs.2020.01.035Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Sajjad Ahmed, Knut Hinkelmann, and Flavio Corradini. 2020. Development of Fake News Model Using Machine Learning through Natural Language Processing. International Journal of Computer and Information Engineering 14, 12 (Nov. 2020), 454–460. https://publications.waset.org/10011624/development-of-fake-news-model-using-machine-learning-through-natural-language-processingGoogle ScholarGoogle Scholar
  3. Monther Aldwairi and Ali Alwahedi. 2018. Detecting Fake News in Social Media Networks. Procedia Computer Science 141 (2018), 215–222. https://doi.org/10.1016/j.procs.2018.10.171Google ScholarGoogle ScholarCross RefCross Ref
  4. S.A. Aljawarneh, V. Radhakrishna, and J.W. Atwood. 2018. Ultimate - Unearthing latent time profiled temporal associations. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280025 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S.A. Aljawarneh, V. Radhakrishna, and J.W. Atwood. 2020. Ultimate: Unearthing Latent Time Profiled Temporal Associations. Foundations of Science 25, 4 (2020), 1147–1171. https://doi.org/10.1007/s10699-019-09594-8Google ScholarGoogle ScholarCross RefCross Ref
  6. S.A. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2018. Extending the Gaussian membership function for finding similarity between temporal patterns. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–6. https://doi.org/10.1109/ICEMIS.2017.8273100 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google ScholarGoogle Scholar
  7. S. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2018. Vrksha – A novel multi-tree based sequential approach for seasonal pattern mining. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234735 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2019. Nirnayam - Fusion of iterative rule based decisions to build decision trees for efficient classification. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330458 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S.A. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2020. VRKSHA: a novel tree structure for time-profiled temporal association mining. Neural Computing and Applications 32, 21 (2020), 16337–16365. https://doi.org/10.1007/s00521-018-3776-7Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S.A. Aljawarneh, V. Radhakrishna, and G.R. Kumar. 2018. A fuzzy measure for intrusion and anomaly detection. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–6. https://doi.org/10.1109/ICEMIS.2017.8273113 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google ScholarGoogle Scholar
  11. S. Aljawarneh, V. Radhakrishna, and G.R. Kumar. 2019. An imputation measure for data imputation and disease classification of medical datasets. AIP Conference Proceedings 2146 (2019). https://doi.org/10.1063/1.5123688 Conference of 1st International Conference on Key Enabling Technologies, KEYTECH 2019 ; Conference Date: 24 April 2019 Through 26 April 2019; Conference Code:150894.Google ScholarGoogle Scholar
  12. S. Aljawarneh, V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A similarity measure for temporal pattern discovery in time series data generated by IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745355 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google ScholarGoogle Scholar
  13. S. Aljawarneh, V. Radhakrishna, and G.S. Reddy. 2018. MANTRA - A novel imputation measure for disease classification and prediction. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280021 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S.A. Aljawarneh and R. Vangipuram. 2020. GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. Journal of Supercomputing 76, 6 (2020), 4376–4413. https://doi.org/10.1007/s11227-018-2397-3Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S.A. Aljawarneh, R. Vangipuram, V.K. Puligadda, and J. Vinjamuri. 2017. G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things. Future Generation Computer Systems 74 (2017), 430–443. https://doi.org/10.1016/j.future.2017.01.013Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Shadi A. Aljawarneh, Ali Alawneh, and Reem Jaradat. 2017. Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems 74 (Sept. 2017), 385–392. https://doi.org/10.1016/j.future.2016.10.005Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shadi A. Aljawarneh, Raja A. Moftah, and Abdelsalam M. Maatuk. 2016. Investigations of automatic methods for detecting the polymorphic worms signatures. Future Generation Computer Systems 60 (July 2016), 67–77. https://doi.org/10.1016/j.future.2016.01.020Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. Comput. Surveys 41, 3 (July 2009), 1–58. https://doi.org/10.1145/1541880.1541882Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Cheruvu and V. Radhakrishna. 2016. Estimating temporal pattern bounds using negative support computations. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745352 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google ScholarGoogle Scholar
  20. A. Cheruvu, V. Radhakrishna, and N. Rajasekhar. 2018. Using normal distribution to retrieve temporal associations by Euclidean distance. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–3. https://doi.org/10.1109/ICEMIS.2017.8273101 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google ScholarGoogle Scholar
  21. Nadia K. Conroy, Victoria L. Rubin, and Yimin Chen. 2015. Automatic deception detection: Methods for finding fake news. Proceedings of the Association for Information Science and Technology 52, 1 (Jan. 2015), 1–4. https://doi.org/10.1002/pra2.2015.145052010082Google ScholarGoogle ScholarCross RefCross Ref
  22. Rajesh Kumar Gunupudi, Mangathayaru Nimmala, Narsimha Gugulothu, and Suresh Reddy Gali. 2017. CLAPP: A self constructing feature clustering approach for anomaly detection. Future Generation Computer Systems 74 (2017), 417–429. https://doi.org/10.1016/j.future.2016.12.040Google ScholarGoogle ScholarCross RefCross Ref
  23. Yaser Khamayseh, Wail Mardini, Shadi Aljawarneh, and Muneer Bani Yassein. 2015. Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture. International Journal of Information and Communication Technology Education 11, 1 (Jan. 2015), 60–74. https://doi.org/10.4018/ijicte.2015010104Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An Approach for Intrusion Detection Using Text Mining Techniques. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 63, 6 pages. https://doi.org/10.1145/2832987.2833076Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An Improved K-Means Clustering Algorithm for Intrusion Detection Using Gaussian Function. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 69, 7 pages. https://doi.org/10.1145/2832987.2833082Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. G. Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2019. Similarity Function for Intrusion Detection. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 28, 4 pages. https://doi.org/10.1145/3330431.3330460Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, and Aravind Cheruvu. 2018. Feature Clustering for Anomaly Detection Using Improved Fuzzy Membership Function. In Proceedings of the Fourth International Conference on Engineering and MIS 2018(Istanbul, Turkey) (ICEMIS ’18). Association for Computing Machinery, New York, NY, USA, Article 35, 9 pages. https://doi.org/10.1145/3234698.3234733Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Arun Nagaraja, Shadi Aljawarneh, and Prabhakara H. S. 2018. PAREEKSHA: a machine learning approach for intrusion and anomaly detection. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems. ACM, Madrid Spain, 1–6. https://doi.org/10.1145/3279996.3280032Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Arun Nagaraja, Uma Boregowda, Khalaf Khatatneh, Radhakrishna Vangipuram, Rajasekhar Nuvvusetty, and V. Sravan Kiran. 2020. Similarity Based Feature Transformation for Network Anomaly Detection. IEEE Access 8(2020), 39184–39196. https://doi.org/10.1109/ACCESS.2020.2975716Google ScholarGoogle ScholarCross RefCross Ref
  30. A. Nagaraja, U. Boregowda, K. Khatatneh, R. Vangipuram, R. Nuvvusetty, and V. Sravan Kiran. 2020. Similarity Based Feature Transformation for Network Anomaly Detection. IEEE Access 8(2020), 39184–39196. https://doi.org/10.1109/ACCESS.2020.2975716Google ScholarGoogle ScholarCross RefCross Ref
  31. Arun Nagaraja, V. Sravan Kiran, Prabhakara H. S, and N. Rajasekhar. 2018. A membership function for intrusion and anomaly detection of low frequency attacks. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems. ACM, Madrid Spain, 1–6. https://doi.org/10.1145/3279996.3280031Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Arun Nagaraja and T. Satish Kumar. 2018. An Extensive Survey on Intrusion Detection- Past, Present, Future. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 - ICEMIS ’18. ACM Press, Istanbul, Turkey, 1–9. https://doi.org/10.1145/3234698.3234743Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Arun Nagaraja and T. Satish Kumar. 2018. A Membership Function for Feature Clustering Based Network Intrusion and Anomaly Detection. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 - ICEMIS ’18. ACM Press, Istanbul, Turkey, 1–6. https://doi.org/10.1145/3234698.3234720Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Arun Nagaraja, Nimmala Mangathayaru, N Rajashekar, and T Satish Kumar. 2016. A survey on routing techniques for transmission of packets in networks. In 2016 International Conference on Engineering & MIS (ICEMIS). IEEE, Agadir, Morocco, 1–6. https://doi.org/10.1109/ICEMIS.2016.7745349Google ScholarGoogle ScholarCross RefCross Ref
  35. Arun Nagaraja and B. Uma. 2019. A generalized research study on distance measures, learning algorithms and datasets. In Proceedings of the 5th International Conference on Engineering and MIS. ACM, Astana Kazakhstan, 1–7. https://doi.org/10.1145/3330431.3330466Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Arun Nagaraja and B. Uma. 2019. Intrusion detection using dimensionality reduced soft matrix. In Proceedings of the 5th International Conference on Engineering and MIS. ACM, Astana Kazakhstan, 1–7. https://doi.org/10.1145/3330431.3330465Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Arun Nagaraja, B. Uma, and Rajesh kumar Gunupudi. 2020. UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation. Foundations of Science 25, 4 (Dec. 2020), 1049–1075. https://doi.org/10.1007/s10699-019-09589-5Google ScholarGoogle ScholarCross RefCross Ref
  38. PhridviRaj, Chintakindi Srinivas, and C.V. GuruRao. 2014. Clustering Text Data Streams – A Tree based Approach with Ternary Function and Ternary Feature Vector. Procedia Computer Science 31 (2014), 976–984. https://doi.org/10.1016/j.procs.2014.05.350 2nd International Conference on Information Technology and Quantitative Management, ITQM 2014.Google ScholarGoogle ScholarCross RefCross Ref
  39. M.S.B. Phridviraj, Vangipuram RadhaKrishna, Chintakindi Srinivas, and C.V. GuruRao. 2015. A Novel Gaussian Based Similarity Measure for Clustering Customer Transactions Using Transaction Sequence Vector. Procedia Technology 19(2015), 880–887. https://doi.org/10.1016/j.protcy.2015.02.126 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, 9-10 October 2014, Tirgu Mures, Romania.Google ScholarGoogle ScholarCross RefCross Ref
  40. M.S.B. Phridviraj, V. Radhakrishna, K. Vinay Kumar, and C.V. GuruRao. 2015. A novel similarity measure for clustering customer transactions using ternary sequence vector. Advances in Intelligent Systems and Computing 347 (2015), 297–308. https://doi.org/10.1007/978-3-319-18476-0_30 Conference of 4th Computer Science On-line Conference, CSOC 2015 ; Conference Date: 27 April 2015 Through 30 April 2015; Conference Code:135449.Google ScholarGoogle ScholarCross RefCross Ref
  41. M. S. B. PhridviRaj and C. V. Guru Rao. 2015. An Approach for Clustering Text Data Streams Using K-Means and Ternary Feature Vector Based Similarity Measure. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 68, 6 pages. https://doi.org/10.1145/2832987.2833081Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. M. S. B. Phridviraj and C. V. Guru Rao. 2019. A Novel Approach for Unsupervised Learning of Transaction Data. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 32, 5 pages. https://doi.org/10.1145/3330431.3330464Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Malik Qasaimeh, Raad S. Al-Qassas, Fida Mohammad, and Shadi Aljawarneh. 2020. A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion. Recent Advances in Computer Science and Communications 13, 3 (Aug. 2020), 435–445. https://doi.org/10.2174/2213275912666181214152207Google ScholarGoogle ScholarCross RefCross Ref
  44. V. RadhaKrishna. 2015. Design and analysis of novel kernel measure for software fault localization. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833042 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. V. Radhakrishna, S. Aljawarneh, and A. Cheruvu. 2018. Sequential approach for mining of temporal itemsets. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234731 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. V. Radhakrishna, S.A. Aljawarneh, V. Janaki, and P.V. Kumar. 2018. Looking into the possibility for designing normal distribution based dissimilarity measure to discover time profiled association patterns. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–5. https://doi.org/10.1109/ICEMIS.2017.8273097 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google ScholarGoogle Scholar
  47. V. Radhakrishna, S. Aljawarneh, P.V. Kumar, and A. Cheruvu. 2018. Kaala VRKSHA - Extending VRKSHA for time profiled temporal association mining. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280026 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. V. Radhakrishna, S.A. Aljawarneh, P.V. Kumar, and K.-K.R. Choo. 2018. A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Computing 22, 6 (2018), 1903–1919. https://doi.org/10.1007/s00500-016-2445-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  49. V. Radhakrishna, S.A. Aljawarneh, P.V. Kumar, and V. Janaki. 2018. A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. Future Generation Computer Systems 83 (2018), 582–595. https://doi.org/10.1016/j.future.2017.03.016Google ScholarGoogle ScholarCross RefCross Ref
  50. V. Radhakrishna, S. Aljawarneh, P.V. Kumar, V. Janaki, and A. Cheruvu. 2019. Discovery of time profiled temporal patterns. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330459 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. V. Radhakrishna, S.A. Aljawarneh, P. Veereswara Kumar, and V. Janaki. 2019. ASTRA - A Novel interest measure for unearthing latent temporal associations and trends through extending basic gaussian membership function. Multimedia Tools and Applications 78, 4 (2019), 4217–4265. https://doi.org/10.1007/s11042-017-5280-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  52. V. Radhakrishna, V. Janaki, S. Aljawarneh, P.V. Kumar, and A. Cheruvu. 2019. Tree based data fusion approach for mining temporal patterns. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330463 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. V. Radhakrishna, P.V. Kumar, S.A. Aljawarneh, and V. Janaki. 2018. Design and analysis of a novel temporal dissimilarity measure using Gaussian membership function. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–5. https://doi.org/10.1109/ICEMIS.2017.8273098 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.Google ScholarGoogle Scholar
  54. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2015. An approach for mining similarity profiled temporal association patterns using Gaussian based dissimilarity measure. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833069 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2015. A temporal pattern mining based approach for intrusion detection using similarity measure. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833077 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. An approach for mining similar temporal association patterns in single database scan. Smart Innovation, Systems and Technologies 51 (2016), 607–617. https://doi.org/10.1007/978-3-319-30927-9_60 Conference of 1st International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2015 ; Conference Date: 28 November 2015 Through 29 November 2015; Conference Code:174689.Google ScholarGoogle ScholarCross RefCross Ref
  57. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A computationally optimal approach for extracting similar temporal patterns. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745344 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google ScholarGoogle Scholar
  58. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Looking into the possibility of novel dissimilarity measure to discover similarity profiled temporal association patterns in IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745353 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google ScholarGoogle Scholar
  59. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Mining of outlier temporal patterns. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745343 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google ScholarGoogle Scholar
  60. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Mining outlier temporal association patterns. ACM International Conference Proceeding Series 04-05-March-2016 (2016). https://doi.org/10.1145/2905055.2905320 Conference of 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016 ; Conference Date: 4 March 2016 Through 5 March 2016; Conference Code:123477.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A novel approach to discover similar temporal association patterns in a single database scan, Krishnan N. Karthikeyan M. (Ed.). 2015 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015(2016). https://doi.org/10.1109/ICCIC.2015.7435809 Conference of 6th IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015 ; Conference Date: 10 December 2015 Through 12 December 2015; Conference Code:120030.Google ScholarGoogle Scholar
  62. V. Radhakrishna, P. Kumar, and V. Janaki. 2016. A novel similar temporal system call pattern mining for efficient intrusion detection. Journal of Universal Computer Science 22, 4 (2016), 475–493. https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978414602&partnerID=40&md5=6bfa14df22045e36f5bf23e839dca48bGoogle ScholarGoogle Scholar
  63. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A single database scan approach for mining temporally similar association patterns. ACM International Conference Proceeding Series 04-05-March-2016 (2016). https://doi.org/10.1145/2905055.2905287 Conference of 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016 ; Conference Date: 4 March 2016 Through 5 March 2016; Conference Code:123477.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2017. A computationally efficient approach for mining similar temporal patterns. Advances in Intelligent Systems and Computing 576 (2017), 197–208. https://doi.org/10.1007/978-3-319-58088-3_19 Conference of 22nd International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Swarm Intelligence, Fuzzy Logic, Neural Networks, Chaos, Bayesian Methods, Intelligent Image Processing, Bio-Inspired Robotics, MENDEL 2016 ; Conference Date: 8 June 2016 Through 10 June 2016; Conference Code:192169.Google ScholarGoogle ScholarCross RefCross Ref
  65. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2018. Krishna sudarsana – A Z-space similarity measure. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234742 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. V. Radhakrishna, P.V. Kumar, and V. Janaki. 2019. GANDIVA: Temporal pattern tree for similarity profiled association mining. International Journal of Information Technology and Web Engineering 14, 4(2019), 1–18. https://doi.org/10.4018/IJITWE.2019100101Google ScholarGoogle ScholarCross RefCross Ref
  67. V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2016. A computationally efficient approach for temporal pattern mining in IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745354 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google ScholarGoogle Scholar
  68. V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2016. A similarity measure for outlier detection in timestamped temporal databases. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745347 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.Google ScholarGoogle Scholar
  69. V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2018. GANDIVA - Time profiled temporal pattern tree. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234734 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. V. Radhakrishna, P.V. Kumar, V. Janaki, and N. Rajasekhar. 2017. Estimating prevalence bounds of temporal association patterns to discover temporally similar patterns. Advances in Intelligent Systems and Computing 576 (2017), 209–220. https://doi.org/10.1007/978-3-319-58088-3_20 Conference of 22nd International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Swarm Intelligence, Fuzzy Logic, Neural Networks, Chaos, Bayesian Methods, Intelligent Image Processing, Bio-Inspired Robotics, MENDEL 2016 ; Conference Date: 8 June 2016 Through 10 June 2016; Conference Code:192169.Google ScholarGoogle ScholarCross RefCross Ref
  71. V. Radhakrishna, P. V. Kumar, and V. Janaki. 2015. A Temporal Pattern Mining Based Approach for Intrusion Detection Using Similarity Measure. In Proceedings of the The International Conference on Engineering & MIS 2015 - ICEMIS ’15. ACM Press, Istanbul, Turkey, 1–8. https://doi.org/10.1145/2832987.2833077Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Vangipuram Radhakrishna, Gali Suresh Reddy, Puligadda Veereswara Kumar, and Vinjamuri Janaki. 2021. Challenge Paper: The Vision for Time Profiled Temporal Association Mining. Journal of Data and Information Quality 13, 2 (May 2021), 1–8. https://doi.org/10.1145/3404198Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Vangipuram Radhakrishna, Chintakindi Srinivas, and C. V. GuruRao. 2014. A Modified Gaussian Similarity Measure for Clustering Software Components and Documents. In Proceedings of the International Conference on Information Systems and Design of Communication (Lisbon, Portugal) (ISDOC ’14). Association for Computing Machinery, New York, NY, USA, 99–104. https://doi.org/10.1145/2618168.2618184Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. V. Radhakrishna, P. Veereswara Kumar, and V. Janaki. 2018. SRIHASS - a similarity measure for discovery of hidden time profiled temporal associations. Multimedia Tools and Applications 77, 14 (2018), 17643–17692. https://doi.org/10.1007/s11042-017-5185-9Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Julio C. S. Reis, Andre Correia, Fabricio Murai, Adriano Veloso, Fabricio Benevenuto, and Erik Cambria. 2019. Supervised Learning for Fake News Detection. IEEE Intelligent Systems 34, 2 (March 2019), 76–81. https://doi.org/10.1109/MIS.2019.2899143Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Victoria L. Rubin, Yimin Chen, and Nadia K. Conroy. 2015. Deception detection for news: Three types of fakes. Proceedings of the Association for Information Science and Technology 52, 1 (Jan. 2015), 1–4. https://doi.org/10.1002/pra2.2015.145052010083Google ScholarGoogle ScholarCross RefCross Ref
  77. Peining Shi, Zhiyong Zhang, and Kim-Kwang Raymond Choo. 2019. Detecting Malicious Social Bots Based on Clickstream Sequences. IEEE Access 7(2019), 28855–28862. https://doi.org/10.1109/ACCESS.2019.2901864Google ScholarGoogle ScholarCross RefCross Ref
  78. Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2013. Clustering Software Components for Program Restructuring and Component Reuse Using Hybrid XOR Similarity Function. AASRI Procedia 4(2013), 319–328. https://doi.org/10.1016/j.aasri.2013.10.047 2013 AASRI Conference on Intelligent Systems and Control.Google ScholarGoogle ScholarCross RefCross Ref
  79. Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2014. Clustering and Classification of Software Component for Efficient Component Retrieval and Building Component Reuse Libraries. Procedia Computer Science 31 (2014), 1044–1050. https://doi.org/10.1016/j.procs.2014.05.358 2nd International Conference on Information Technology and Quantitative Management, ITQM 2014.Google ScholarGoogle ScholarCross RefCross Ref
  80. Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2014. Clustering Software Components for Program Restructuring and Component Reuse Using Hybrid XNOR Similarity Function. Procedia Technology 12(2014), 246–254. https://doi.org/10.1016/j.protcy.2013.12.482 The 7th International Conference Interdisciplinarity in Engineering, INTER-ENG 2013, 10-11 October 2013, Petru Maior University of Tirgu Mures, Romania.Google ScholarGoogle ScholarCross RefCross Ref
  81. Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2015. Software Component Clustering and Classification Using Novel Similarity Measure. Procedia Technology 19(2015), 866–873. https://doi.org/10.1016/j.protcy.2015.02.124 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, 9-10 October 2014, Tirgu Mures, Romania.Google ScholarGoogle ScholarCross RefCross Ref
  82. Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2013. Clustering Software Components for Component Reuse and Program Restructuring. In Proceedings of the Second International Conference on Innovative Computing and Cloud Computing(Wuhan, China) (ICCC ’13). Association for Computing Machinery, New York, NY, USA, 261–266. https://doi.org/10.1145/2556871.2556933Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2013. Clustering Software Components for Component Reuse and Program Restructuring. In Proceedings of the Second International Conference on Innovative Computing and Cloud Computing(Wuhan, China) (ICCC ’13). Association for Computing Machinery, New York, NY, USA, 261–266. https://doi.org/10.1145/2556871.2556933Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2015. Clustering Software Project Components for Strategic Decisions and Building Reuse Libraries. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 62, 5 pages. https://doi.org/10.1145/2832987.2833075Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Chintakindi Srinivas and C. V. Guru Rao. 2015. A Feature Vector Based Approach for Software Component Clustering and Reuse Using K-Means. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 67, 5 pages. https://doi.org/10.1145/2832987.2833080Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Chintakindi Srinivas and C. V. Guru Rao. 2019. A Novel Approach for Unsupervised Learning of Software Components. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 29, 6 pages. https://doi.org/10.1145/3330431.3330461Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Kelly Stahl. 2018. Fake news detection in social media. https://www.semanticscholar.org/paper/Fake-news-detection-in-social-media-Stahl/b202b4b7124b774391109dc47a33e17224b12295Google ScholarGoogle Scholar
  88. R. Vangipuram, R.K. Gunupudi, V.K. Puligadda, and J. Vinjamuri. 2020. A machine learning approach for imputation and anomaly detection in IoT environment. Expert Systems 37, 5 (2020). https://doi.org/10.1111/exsy.12556Google ScholarGoogle Scholar
  89. R. Vangipuram, P.V. Kumar, V. Janaki, S.A. Aljawarneh, J.A. Lara, and K. Khatatneh. 2020. Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns. Foundations of Science 25, 4 (2020), 1027–1048. https://doi.org/10.1007/s10699-019-09590-yGoogle ScholarGoogle ScholarCross RefCross Ref
  90. Vinjamuri Janaki Vangipuram Radhakrishna, Puligadda Veereswara Kumar. 2016. (V. Radhakrishna, P. Kumar, V. Janaki) A Novel Similar Temporal System Call Pattern Mining for EfficientIntrusion Detection. http://www.jucs.org/jucs_22_4/a_novel_similar_temporalGoogle ScholarGoogle Scholar
  91. Kuai Xu, Feng Wang, Haiyan Wang, and Bo Yang. 2020. Detecting fake news over online social media via domain reputations and content understanding. Tsinghua Science and Technology 25, 1 (Feb. 2020), 20–27. https://doi.org/10.26599/TST.2018.9010139Google ScholarGoogle ScholarCross RefCross Ref
  92. Muneer Bani Yassien, Shadi A. Aljawarneh, Mohammad Eyadat, and Eman Eaydat. 2021. Routing protocol for low power and lossy network–load balancing time-based. International Journal of Machine Learning and Cybernetics (Jan. 2021). https://doi.org/10.1007/s13042-020-01261-wGoogle ScholarGoogle ScholarCross RefCross Ref
  93. Xinyi Zhou and Reza Zafarani. 2020. A Survey of Fake News: Fundamental Theories, Detection Methods, and Opportunities. Comput. Surveys 53, 5 (Oct. 2020), 1–40. https://doi.org/10.1145/3395046Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Fake News Detection Using Machine Learning Methods
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          DATA'21: International Conference on Data Science, E-learning and Information Systems 2021
          April 2021
          277 pages
          ISBN:9781450388382
          DOI:10.1145/3460620

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 June 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate74of167submissions,44%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format