Skip to main content
Erschienen in: The Journal of Supercomputing 6/2024

13.11.2023

Rumor identification and diffusion impact analysis in real-time text stream using deep learning

verfasst von: Tajinder Singh, Madhu Kumari, Daya Sagar Gupta

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Researchers have applied marvelous endeavors in developing and designing methodologies to understand the behavioral of social media data. Various social media data have allegedly been used as a platform of rumor promotions with momentous political, economic, personal and social outcomes in numerous countries. In the existing approaches, diffusion rate of rumor words in terms of continuous and discrete time is not analyzed on the basis of their contextual polarity including their impact on social media users. It has been observed that the trust on rumor words based on user classification also plays a significant role which needs to be addressed. Therefore, we designed rumor detection and analysis methodologies in continuous and discrete time via deep learning. An efficient preprocessing approach is designed to clean the collected data. A weigh-based threshold mechanism is opted to compute various rumor-based features and their diffusion tendency in the continuous and discrete case. The proposed approach is tested on five sets of real-time data and on comparison with state-of-the-art (SOTA) methods which are CNN, KNN, LSTM and Word2Vec and noticed that rumor keyword recall and rumor keyword precision has been significantly improved. Efficiency of the proposed approach in terms of rumor-based keyword detection is also computed in which proposed approach detects 84.58, 83.46, 83.59, 83.05 and 84.47 with less loss of data than existing SOTA methods. Computation time of proposed approach is 0.59, 0.53, 0.57, 0.49, 0.47 for CoAID, FakeNewsNet, LIAR, CORD-19 and PHEME, respectively, which is quite less than SOTA methods (LSTM, CNN, Word2Vec and KNN). Practically, our proposed approach will play a significant role to improve the eminence of the rumor detection mechanism for social media platforms. Further, if we categorize the people on the basis of their influential role to spread rumor, then the trust factor based on user’s classification is computed. A real-time case study is an evidence of the efficiency of our proposed approach which provide empirical findings of detecting online rumor including trust based on social media user crowd. The source code is available at the GitHub.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Agarwal SD, Bennett WL, Johnson CN, Walker S (2014) A model of crowd enabled organization: Theory and methods for understanding the role of twitter in the occupy protests. International Journal of Communication 8:27 Agarwal SD, Bennett WL, Johnson CN, Walker S (2014) A model of crowd enabled organization: Theory and methods for understanding the role of twitter in the occupy protests. International Journal of Communication 8:27
2.
Zurück zum Zitat Aggarwal CC, Yu PS (2010) On clustering massive text and categorical data streams. Knowledge and information systems 24(2):171–196CrossRef Aggarwal CC, Yu PS (2010) On clustering massive text and categorical data streams. Knowledge and information systems 24(2):171–196CrossRef
3.
Zurück zum Zitat Allan J, Carbonell JG, Doddington G, Yamron J, Yang Y (1998) Topic detection and tracking pilot study final report. Carnegie Mellon University Allan J, Carbonell JG, Doddington G, Yamron J, Yang Y (1998) Topic detection and tracking pilot study final report. Carnegie Mellon University
4.
Zurück zum Zitat Allport GW, Postman L (1946) An analysis of rumor. Public opinion quarterly 10(4):501–517CrossRef Allport GW, Postman L (1946) An analysis of rumor. Public opinion quarterly 10(4):501–517CrossRef
5.
Zurück zum Zitat Alsaeedi A, Al-Sarem M (2020) Detecting rumors on social media based on a cnn deep learning technique. Arabian Journal for Science and Engineering 45(12):10,813-10,844CrossRef Alsaeedi A, Al-Sarem M (2020) Detecting rumors on social media based on a cnn deep learning technique. Arabian Journal for Science and Engineering 45(12):10,813-10,844CrossRef
6.
Zurück zum Zitat Azar PD, Lo AW (2016) The wisdom of twitter crowds: Predicting stock market reactions to fomc meetings via twitter feeds. The Journal of Portfolio Management 42(5):123–134CrossRef Azar PD, Lo AW (2016) The wisdom of twitter crowds: Predicting stock market reactions to fomc meetings via twitter feeds. The Journal of Portfolio Management 42(5):123–134CrossRef
7.
Zurück zum Zitat Bordia P (1996) Studying verbal interaction on the internet: The case of rumor transmission research. Behavior Research Methods, Instruments, & Computers 28(2):149–151CrossRef Bordia P (1996) Studying verbal interaction on the internet: The case of rumor transmission research. Behavior Research Methods, Instruments, & Computers 28(2):149–151CrossRef
8.
Zurück zum Zitat Cai G, Wu H, Lv R (2014) Rumors detection in chinese via crowd responses. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), IEEE, pp 912–917 Cai G, Wu H, Lv R (2014) Rumors detection in chinese via crowd responses. In: 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), IEEE, pp 912–917
9.
Zurück zum Zitat Castillo C (2016) Big crisis data: social media in disasters and time-critical situations. Cambridge University PressCrossRef Castillo C (2016) Big crisis data: social media in disasters and time-critical situations. Cambridge University PressCrossRef
10.
Zurück zum Zitat Castillo C, Mendoza M, Poblete B (2013) Predicting information credibility in time-sensitive social media. Internet Research Castillo C, Mendoza M, Poblete B (2013) Predicting information credibility in time-sensitive social media. Internet Research
11.
Zurück zum Zitat Chang C, Zhang Y, Szabo C, Sheng QZ (2016) Extreme user and political rumor detection on twitter. In: International Conference on Advanced Data Mining and Applications, Springer, pp 751–763 Chang C, Zhang Y, Szabo C, Sheng QZ (2016) Extreme user and political rumor detection on twitter. In: International Conference on Advanced Data Mining and Applications, Springer, pp 751–763
12.
Zurück zum Zitat Chen W, Yeo CK, Lau CT, Lee BS (2016) Behavior deviation: An anomaly detection view of rumor preemption. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), IEEE, pp 1–7 Chen W, Yeo CK, Lau CT, Lee BS (2016) Behavior deviation: An anomaly detection view of rumor preemption. In: 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), IEEE, pp 1–7
13.
Zurück zum Zitat Chen X, Wang N (2020) Rumor spreading model considering rumor credibility, correlation and crowd classification based on personality. Scientific reports 10(1):1–15 Chen X, Wang N (2020) Rumor spreading model considering rumor credibility, correlation and crowd classification based on personality. Scientific reports 10(1):1–15
14.
Zurück zum Zitat Chen YC, Liu ZY, Kao HY (2017) Ikm at semeval-2017 task 8: Convolutional neural networks for stance detection and rumor verification. In: Proceedings of the 11th international workshop on semantic evaluation (SemEval-2017), pp 465–469 Chen YC, Liu ZY, Kao HY (2017) Ikm at semeval-2017 task 8: Convolutional neural networks for stance detection and rumor verification. In: Proceedings of the 11th international workshop on semantic evaluation (SemEval-2017), pp 465–469
15.
Zurück zum Zitat Chua AY, Banerjee S (2016) Linguistic predictors of rumor veracity on the internet. Proceedings of the International MultiConference of Engineers and Computer Scientists 1:387–391 Chua AY, Banerjee S (2016) Linguistic predictors of rumor veracity on the internet. Proceedings of the International MultiConference of Engineers and Computer Scientists 1:387–391
16.
Zurück zum Zitat Collins B, Hoang DT, Nguyen NT, Hwang D (2021) Trends in combating fake news on social media-a survey. Journal of Information and Telecommunication 5(2):247–266CrossRef Collins B, Hoang DT, Nguyen NT, Hwang D (2021) Trends in combating fake news on social media-a survey. Journal of Information and Telecommunication 5(2):247–266CrossRef
17.
Zurück zum Zitat Coscia M, Neffke FM (2017) Network backboning with noisy data. In: 2017 IEEE 33rd International Conference on Data Engineering (ICDE), IEEE, pp 425–436 Coscia M, Neffke FM (2017) Network backboning with noisy data. In: 2017 IEEE 33rd International Conference on Data Engineering (ICDE), IEEE, pp 425–436
18.
Zurück zum Zitat Diakopoulos N, De Choudhury M, Naaman M (2012) Finding and assessing social media information sources in the context of journalism. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp 2451–2460 Diakopoulos N, De Choudhury M, Naaman M (2012) Finding and assessing social media information sources in the context of journalism. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp 2451–2460
19.
Zurück zum Zitat DiFonzo N, Bordia P (2007) Rumor, gossip and urban legends. Diogenes 54(1):19–35CrossRef DiFonzo N, Bordia P (2007) Rumor, gossip and urban legends. Diogenes 54(1):19–35CrossRef
20.
Zurück zum Zitat Donovan P (2007) How idle is idle talk? one hundred years of rumor research. Diogenes 54(1):59–82CrossRef Donovan P (2007) How idle is idle talk? one hundred years of rumor research. Diogenes 54(1):59–82CrossRef
21.
Zurück zum Zitat Eismann K (2021) Diffusion and persistence of false rumors in social media networks: implications of searchability on rumor self-correction on twitter. Journal of Business Economics pp 1–31 Eismann K (2021) Diffusion and persistence of false rumors in social media networks: implications of searchability on rumor self-correction on twitter. Journal of Business Economics pp 1–31
22.
Zurück zum Zitat Fuchs C (2014) Social media, politics and the state: Protests, revolutions, riots, crime and policing in the age of Facebook, twitter and Youtube. Routledge Fuchs C (2014) Social media, politics and the state: Protests, revolutions, riots, crime and policing in the age of Facebook, twitter and Youtube. Routledge
23.
Zurück zum Zitat Gao Y, Wang F, Luan H, Chua TS (2014) Brand data gathering from live social media streams. In: Proceedings of International Conference on Multimedia Retrieval, pp 169–176 Gao Y, Wang F, Luan H, Chua TS (2014) Brand data gathering from live social media streams. In: Proceedings of International Conference on Multimedia Retrieval, pp 169–176
24.
Zurück zum Zitat Hermida A (2010) Twittering the news: The emergence of ambient journalism. Journalism practice 4(3):297–308CrossRef Hermida A (2010) Twittering the news: The emergence of ambient journalism. Journalism practice 4(3):297–308CrossRef
25.
Zurück zum Zitat Javed U, Shaukat K, Hameed IA, Iqbal F, Alam TM, Luo S (2021) A review of content-based and context-based recommendation systems. International Journal of Emerging Technologies in Learning (iJET) 16(3):274–306CrossRef Javed U, Shaukat K, Hameed IA, Iqbal F, Alam TM, Luo S (2021) A review of content-based and context-based recommendation systems. International Journal of Emerging Technologies in Learning (iJET) 16(3):274–306CrossRef
26.
Zurück zum Zitat Kaliyar RK, Goswami A, Narang P (2021) Fakebert: Fake news detection in social media with a bert-based deep learning approach. Multimedia Tools and Applications 80(8):11,765-11,788CrossRef Kaliyar RK, Goswami A, Narang P (2021) Fakebert: Fake news detection in social media with a bert-based deep learning approach. Multimedia Tools and Applications 80(8):11,765-11,788CrossRef
27.
Zurück zum Zitat Krishnan S, Chen M (2018) Identifying tweets with fake news. In: 2018 IEEE International Conference on Information Reuse and Integration (IRI), IEEE, pp 460–464 Krishnan S, Chen M (2018) Identifying tweets with fake news. In: 2018 IEEE International Conference on Information Reuse and Integration (IRI), IEEE, pp 460–464
28.
Zurück zum Zitat Kwon S, Cha M, Jung K (2017) Rumor detection over varying time windows. PloS one 12(1):e0168,344 Kwon S, Cha M, Jung K (2017) Rumor detection over varying time windows. PloS one 12(1):e0168,344
29.
Zurück zum Zitat Lazer D, Pentland AS, Adamic L, Aral S, Barabasi AL, Brewer D, Christakis N, Contractor N, Fowler J, Gutmann M et al (2009) Life in the network: the coming age of computational social science. Science (New York, NY) 323(5915):721CrossRef Lazer D, Pentland AS, Adamic L, Aral S, Barabasi AL, Brewer D, Christakis N, Contractor N, Fowler J, Gutmann M et al (2009) Life in the network: the coming age of computational social science. Science (New York, NY) 323(5915):721CrossRef
30.
Zurück zum Zitat Li H, Sakamoto Y (2015) Computing the veracity of information through crowds: A method for reducing the spread of false messages on social media. In: 2015 48th Hawaii International Conference on System Sciences, IEEE, pp 2003–2012 Li H, Sakamoto Y (2015) Computing the veracity of information through crowds: A method for reducing the spread of false messages on social media. In: 2015 48th Hawaii International Conference on System Sciences, IEEE, pp 2003–2012
31.
Zurück zum Zitat Li Q, Zhang Q, Si L (2019) Rumor detection by exploiting user credibility information, attention and multi-task learning. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp 1173–1179 Li Q, Zhang Q, Si L (2019) Rumor detection by exploiting user credibility information, attention and multi-task learning. In: Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, pp 1173–1179
32.
Zurück zum Zitat Liang G, He W, Xu C, Chen L, Zeng J (2015) Rumor identification in microblogging systems based on users’ behavior. IEEE Transactions on Computational Social Systems 2(3):99–108CrossRef Liang G, He W, Xu C, Chen L, Zeng J (2015) Rumor identification in microblogging systems based on users’ behavior. IEEE Transactions on Computational Social Systems 2(3):99–108CrossRef
33.
Zurück zum Zitat Liu Y, Wu YFB (2018) Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks. In: Thirty-second AAAI Conference on Artificial Intelligence Liu Y, Wu YFB (2018) Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks. In: Thirty-second AAAI Conference on Artificial Intelligence
34.
Zurück zum Zitat Lukasik M, Srijith P, Vu D, Bontcheva K, Zubiaga A, Cohn T (2016) Hawkes processes for continuous time sequence classification: an application to rumour stance classification in twitter. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pp 393–398 Lukasik M, Srijith P, Vu D, Bontcheva K, Zubiaga A, Cohn T (2016) Hawkes processes for continuous time sequence classification: an application to rumour stance classification in twitter. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pp 393–398
35.
Zurück zum Zitat Ma J, Gao W, Wong KF (2018) Rumor detection on twitter with tree-structured recursive neural networks. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics Ma J, Gao W, Wong KF (2018) Rumor detection on twitter with tree-structured recursive neural networks. In: Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics
36.
Zurück zum Zitat Naseem U, Khushi M, Khan SK, Shaukat K, Moni MA (2021) A comparative analysis of active learning for biomedical text mining. Applied System Innovation 4(1):23CrossRef Naseem U, Khushi M, Khan SK, Shaukat K, Moni MA (2021) A comparative analysis of active learning for biomedical text mining. Applied System Innovation 4(1):23CrossRef
37.
Zurück zum Zitat Nasir A, Shaukat K, Hameed IA, Luo S, Alam TM, Iqbal F (2020) A bibliometric analysis of corona pandemic in social sciences: a review of influential aspects and conceptual structure. Ieee Access 8:133,377–133,402 Nasir A, Shaukat K, Hameed IA, Luo S, Alam TM, Iqbal F (2020) A bibliometric analysis of corona pandemic in social sciences: a review of influential aspects and conceptual structure. Ieee Access 8:133,377–133,402
38.
Zurück zum Zitat Phuvipadawat S, Murata T (2010) Breaking news detection and tracking in twitter. In: 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE, vol 3, pp 120–123 Phuvipadawat S, Murata T (2010) Breaking news detection and tracking in twitter. In: 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, IEEE, vol 3, pp 120–123
39.
Zurück zum Zitat Qazvinian V, Rosengren E, Radev D, Mei Q (2011) Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, pp 1589–1599 Qazvinian V, Rosengren E, Radev D, Mei Q (2011) Rumor has it: Identifying misinformation in microblogs. In: Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing, pp 1589–1599
40.
Zurück zum Zitat Rosnow RL, Foster EK (2005) Rumor and gossip research. Psychological Science Agenda 19(4):1–2 Rosnow RL, Foster EK (2005) Rumor and gossip research. Psychological Science Agenda 19(4):1–2
41.
Zurück zum Zitat Santhoshkumar S, Babu LD (2020) Earlier detection of rumors in online social networks using certainty-factor-based convolutional neural networks. Social Network Analysis and Mining 10(1):1–17CrossRef Santhoshkumar S, Babu LD (2020) Earlier detection of rumors in online social networks using certainty-factor-based convolutional neural networks. Social Network Analysis and Mining 10(1):1–17CrossRef
42.
Zurück zum Zitat Shaukat K, Masood N, Khushi M (2019) A novel approach to data extraction on hyperlinked webpages. Applied Sciences 9(23):5102CrossRef Shaukat K, Masood N, Khushi M (2019) A novel approach to data extraction on hyperlinked webpages. Applied Sciences 9(23):5102CrossRef
43.
Zurück zum Zitat Shaukat K, Luo S, Varadharajan V, Hameed IA, Chen S, Liu D, Li J (2020) Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies 13(10):2509CrossRef Shaukat K, Luo S, Varadharajan V, Hameed IA, Chen S, Liu D, Li J (2020) Performance comparison and current challenges of using machine learning techniques in cybersecurity. Energies 13(10):2509CrossRef
44.
Zurück zum Zitat Shaukat K, Luo S, Varadharajan V, Hameed IA, Xu M (2020b) A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8:222,310–222,354 Shaukat K, Luo S, Varadharajan V, Hameed IA, Xu M (2020b) A survey on machine learning techniques for cyber security in the last decade. IEEE Access 8:222,310–222,354
45.
Zurück zum Zitat Shaukat K, Luo S, Varadharajan V (2022) A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks. Engineering Applications of Artificial Intelligence 116(105):461 Shaukat K, Luo S, Varadharajan V (2022) A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks. Engineering Applications of Artificial Intelligence 116(105):461
46.
Zurück zum Zitat Shirai T, Sakaki T, Toriumi F, Shinoda K, Kazama K, Noda I, Numao M, Kurihara S (2012) Estimation of false rumor diffusion model and estimation of prevention model of false rumor diffusion on twitter. In: The 26th Anual Conference of the Japanese Society for Artificial Intelligence Shirai T, Sakaki T, Toriumi F, Shinoda K, Kazama K, Noda I, Numao M, Kurihara S (2012) Estimation of false rumor diffusion model and estimation of prevention model of false rumor diffusion on twitter. In: The 26th Anual Conference of the Japanese Society for Artificial Intelligence
47.
Zurück zum Zitat Silverman C (2014) Lies, damn lies, and viral content: How news websites spread (and debunk) online rumors, unverified claims, and misinformation (tow center for digital journalism a tow/knight report). new york, ny: Columbia journalism school Silverman C (2014) Lies, damn lies, and viral content: How news websites spread (and debunk) online rumors, unverified claims, and misinformation (tow center for digital journalism a tow/knight report). new york, ny: Columbia journalism school
48.
Zurück zum Zitat Singh T, Kumari M (2016) Role of text pre-processing in twitter sentiment analysis. Procedia Computer Science 89:549–554CrossRef Singh T, Kumari M (2016) Role of text pre-processing in twitter sentiment analysis. Procedia Computer Science 89:549–554CrossRef
49.
Zurück zum Zitat Singh T, Kumari M (2021) Burst: real-time events burst detection in social text stream. The Journal of Supercomputing 77:11,228–11,256 Singh T, Kumari M (2021) Burst: real-time events burst detection in social text stream. The Journal of Supercomputing 77:11,228–11,256
50.
Zurück zum Zitat Singh T, Kumari M, Gupta DS (2022) Real-time event detection and classification in social text steam using embedding. Cluster Computing 25(6):3799–3817CrossRef Singh T, Kumari M, Gupta DS (2022) Real-time event detection and classification in social text steam using embedding. Cluster Computing 25(6):3799–3817CrossRef
51.
Zurück zum Zitat Singh T, Kumari M, Gupta DS, Siniak N (2023) Axiomatic analysis of pre-processing methodologies using machine learning in text mining: A social media perspective in internet of things. Convergence of Cloud with AI for Big Data Analytics: Foundations and Innovation p 229 Singh T, Kumari M, Gupta DS, Siniak N (2023) Axiomatic analysis of pre-processing methodologies using machine learning in text mining: A social media perspective in internet of things. Convergence of Cloud with AI for Big Data Analytics: Foundations and Innovation p 229
52.
Zurück zum Zitat Starbird K, Maddock J, Orand M, Achterman P, Mason RM (2014) Rumors, false flags, and digital vigilantes: Misinformation on twitter after the 2013 boston marathon bombing. IConference 2014 Proceedings Starbird K, Maddock J, Orand M, Achterman P, Mason RM (2014) Rumors, false flags, and digital vigilantes: Misinformation on twitter after the 2013 boston marathon bombing. IConference 2014 Proceedings
53.
Zurück zum Zitat Takahashi T, Igata N (2012) Rumor detection on twitter. In: The 6th International Conference on Soft Computing and Intelligent Systems, and The 13th International Symposium on Advanced Intelligence Systems, IEEE, pp 452–457 Takahashi T, Igata N (2012) Rumor detection on twitter. In: The 6th International Conference on Soft Computing and Intelligent Systems, and The 13th International Symposium on Advanced Intelligence Systems, IEEE, pp 452–457
54.
Zurück zum Zitat Tolmie P, Procter R, Randall DW, Rouncefield M, Burger C, Wong Sak Hoi G, Zubiaga A, Liakata M (2017) Supporting the use of user generated content in journalistic practice. In: Proceedings of the 2017 chi Conference on Human Factors in Computing Systems, pp 3632–3644 Tolmie P, Procter R, Randall DW, Rouncefield M, Burger C, Wong Sak Hoi G, Zubiaga A, Liakata M (2017) Supporting the use of user generated content in journalistic practice. In: Proceedings of the 2017 chi Conference on Human Factors in Computing Systems, pp 3632–3644
55.
Zurück zum Zitat Tolmie P, Procter R, Rouncefield M, Liakata M, Zubiaga A (2018) Microblog analysis as a program of work. ACM Transactions on Social Computing 1(1):1–40CrossRef Tolmie P, Procter R, Rouncefield M, Liakata M, Zubiaga A (2018) Microblog analysis as a program of work. ACM Transactions on Social Computing 1(1):1–40CrossRef
56.
Zurück zum Zitat Wang Y, Ma F, Jin Z, Yuan Y, Xun G, Jha K, Su L, Gao J (2018) Eann: Event adversarial neural networks for multi-modal fake news detection. In: Proceedings of the 24th acm Sigkdd International Conference on Knowledge Discovery & Data Mining, pp 849–857 Wang Y, Ma F, Jin Z, Yuan Y, Xun G, Jha K, Su L, Gao J (2018) Eann: Event adversarial neural networks for multi-modal fake news detection. In: Proceedings of the 24th acm Sigkdd International Conference on Knowledge Discovery & Data Mining, pp 849–857
57.
Zurück zum Zitat Webb H, Burnap P, Procter R, Rana O, Stahl BC, Williams M, Housley W, Edwards A, Jirotka M (2016) Digital wildfires: Propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems (TOIS) 34(3):1–23CrossRef Webb H, Burnap P, Procter R, Rana O, Stahl BC, Williams M, Housley W, Edwards A, Jirotka M (2016) Digital wildfires: Propagation, verification, regulation, and responsible innovation. ACM Transactions on Information Systems (TOIS) 34(3):1–23CrossRef
58.
Zurück zum Zitat Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: Early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th International Conference on World Wide Web, pp 1395–1405 Zhao Z, Resnick P, Mei Q (2015) Enquiring minds: Early detection of rumors in social media from enquiry posts. In: Proceedings of the 24th International Conference on World Wide Web, pp 1395–1405
Metadaten
Titel
Rumor identification and diffusion impact analysis in real-time text stream using deep learning
verfasst von
Tajinder Singh
Madhu Kumari
Daya Sagar Gupta
Publikationsdatum
13.11.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2024
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05726-x

Weitere Artikel der Ausgabe 6/2024

The Journal of Supercomputing 6/2024 Zur Ausgabe

Premium Partner