{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:12:23Z","timestamp":1728177143042},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s13278-022-00880-1","type":"journal-article","created":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T06:02:37Z","timestamp":1653112957000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["UCred: fusion of machine learning and deep learning methods for user credibility on social media"],"prefix":"10.1007","volume":"12","author":[{"given":"Pawan Kumar","family":"Verma","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6861-0698","authenticated-orcid":false,"given":"Prateek","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Vishu","family":"Madaan","sequence":"additional","affiliation":[]},{"given":"Charu","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,21]]},"reference":[{"issue":"32","key":"880_CR1","first-page":"1","volume":"5","author":"JS Alowibdi","year":"2015","unstructured":"Alowibdi JS, Buy UA, Yu PS, Ghani S, Mokbel M (2015) Deception detection in twitter. Soc Netw Anal Min 5(32):1\u201316","journal-title":"Soc Netw Anal Min"},{"issue":"5","key":"880_CR2","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1080\/15205436.2020.1750656","volume":"23","author":"Y Cheng","year":"2020","unstructured":"Cheng Y, Chen ZF (2020) The influence of presumed fake news influence: examining public support for corporate corrective response, media literacy interventions, and governmental regulation. Mass Commun Soc 23(5):705\u2013729","journal-title":"Mass Commun Soc"},{"issue":"6","key":"880_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0128193","volume":"10","author":"GL Ciampaglia","year":"2015","unstructured":"Ciampaglia GL, Shiralkar P, Rocha LM, Bollen J, Menczer F, Flammini A (2015) Computational fact checking from knowledge networks. PLOS ONE 10(6):1\u201313, 06","journal-title":"PLOS ONE"},{"key":"880_CR4","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.eswa.2019.03.036","volume":"128","author":"G Gravanis","year":"2019","unstructured":"Gravanis G, Vakali A, Diamantaras K, Karadais P (2019) Behind the cues: a benchmarking study for fake news detection. Expert Syst Appl 128:201\u2013213","journal-title":"Expert Syst Appl"},{"key":"880_CR5","doi-asserted-by":"publisher","first-page":"1771","DOI":"10.1007\/s11063-019-10185-8","volume":"51","author":"Y Liu","year":"2020","unstructured":"Liu Y, Mu Y, Chen K, Li Y, Guo J (2020) Daily activity feature selection in smart homes based on Pearson correlation coefficient. Neural Process Lett 51:1771\u20131787","journal-title":"Neural Process Lett"},{"issue":"1","key":"880_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/JPROC.2015.2483592","volume":"104","author":"M Nickel","year":"2016","unstructured":"Nickel M, Murphy K, Tresp V, Gabrilovich E (2016) A review of relational machine learning for knowledge graphs. Proc IEEE 104(1):11\u201333","journal-title":"Proc IEEE"},{"key":"880_CR7","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2015.2482465","volume":"11","author":"X Ruan","year":"2016","unstructured":"Ruan X, Wu Z, Wang H, Jajodia S (2016) Profiling online social behaviors for compromised account detection. IEEE Trans Inf Forens Secur 11:176\u2013187","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"5","key":"880_CR8","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1002\/asi.23216","volume":"66","author":"VL Rubin","year":"2015","unstructured":"Rubin VL, Lukoianova T (2015) Truth and deception at the rhetorical structure level. J Assoc Inf Sci Technol 66(5):905\u2013917","journal-title":"J Assoc Inf Sci Technol"},{"key":"880_CR9","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.knosys.2016.04.015","volume":"104","author":"B Shi","year":"2016","unstructured":"Shi B, Weninger T (2016) Discriminative predicate path mining for fact checking in knowledge graphs. Knowl-Based Syst 104:123\u2013133","journal-title":"Knowl-Based Syst"},{"key":"880_CR10","first-page":"1","volume":"52","author":"P Wanda","year":"2020","unstructured":"Wanda P, Jie HJ (2020) Deepprofile: finding fake profile in online social network using dynamic CNN. J Inf Secur Appl 52:1\u201313","journal-title":"J Inf Secur Appl"},{"key":"880_CR11","first-page":"1","volume":"27","author":"C Wardle","year":"2017","unstructured":"Wardle C, Derakhshan H (2017) Information disorder: toward an interdisciplinary framework for research and policy making. Council Europe Rep 27:1\u2013109","journal-title":"Council Europe Rep"},{"issue":"5","key":"880_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3395046","volume":"53","author":"X Zhou","year":"2020","unstructured":"Zhou X, Zafarani R (2020) A survey of fake news: fundamental theories, detection methods, and opportunities. ACM Comput Surv 53(5):1\u201340","journal-title":"ACM Comput Surv"},{"key":"880_CR13","doi-asserted-by":"crossref","unstructured":"Akyon FC, Esat Kalfaoglu M (2019) Instagram fake and automated account detection. In: Innovations in intelligent systems and applications conference (ASYU). Izmir, Turkey, IEEE, pp 1\u20137","DOI":"10.1109\/ASYU48272.2019.8946437"},{"key":"880_CR14","doi-asserted-by":"crossref","unstructured":"Al-Qurishi M, Al-Rakhami M, Alamri A, Alrubaian M, Rahman SMM, Hossain MS (2017) Sybil defense techniques in online social networks: a survey. IEEE Access, pp 1200\u20131219","DOI":"10.1109\/ACCESS.2017.2656635"},{"key":"880_CR16","doi-asserted-by":"crossref","unstructured":"Dickerson JP, Kagan V, Subrahmanian VS (2014) Using sentiment to detect bots on twitter: are humans more opinionated than bots? Advances in Social Networks Analysis and Mining. Beijing, China, IEEE\/ACM, pp 620\u2013627","DOI":"10.1109\/ASONAM.2014.6921650"},{"key":"880_CR17","doi-asserted-by":"crossref","unstructured":"Ersahin B, Aktas O, Kilinc D, Akyol C (2017) Twitter fake account detection. In: International conference on computer science and engineering (UBMK). IEEE, Antalya, Turkey, pp 388\u2013392","DOI":"10.1109\/UBMK.2017.8093420"},{"key":"880_CR19","unstructured":"Facebook may have over 100 million fake accounts globally (2014) https:\/\/www.gadgetsnow.com\/tech-news\/Facebook-may-have-over-100-million-fake-accounts-globally\/articleshow\/34672084.cms. Accessed 6 Oct 2020"},{"key":"880_CR15","unstructured":"Facebook Principles (2015) Facebook profile: terms of service. https:\/\/www.facebook.com\/legal\/terms. Accessed 6 Oct 2020"},{"key":"880_CR18","unstructured":"Facebook, twitter remove russia-backed fake account network (2020) https:\/\/www.gadgetsnow.com\/tech-news\/facebook-twitter-remove-russia-backed-fake-account-network\/articleshow\/74626530.cms. Accessed 6 Oct 2020"},{"key":"880_CR21","doi-asserted-by":"crossref","unstructured":"Liu Y, Wu YB (2018) Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks. In: Proceedings of the thirty-second AAAI conference on artificial intelligence. AAAI Press, New Orleans, Louisiana, USA, pp 354\u2013361","DOI":"10.1609\/aaai.v32i1.11268"},{"key":"880_CR22","unstructured":"Liu Y, Ott M, Goyal N, Du J, Joshi M, Chen D, Levy O, Lewis M, Zettlemoyer L, Stoyanov V (2019) Roberta: a robustly optimized bert pretraining approach, pp 1\u201313"},{"key":"880_CR23","doi-asserted-by":"crossref","unstructured":"Mateen M, Iqbal MA, Aleem M, Islam MA (2017) A hybrid approach for spam detection for twitter. In: 14th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, Islamabad, Pakistan, pp 466\u2013471","DOI":"10.1109\/IBCAST.2017.7868095"},{"key":"880_CR24","unstructured":"Monti F, Frasca F, Eynard D, Mannion D, Bronstein MM (2019) Fake news detection on social media using geometric deep learning, pp 1\u201315"},{"key":"880_CR26","unstructured":"P\u00e9rez-Rosas V, Kleinberg B, Lefevre A, Mihalcea R (2018) Automatic detection of fake news. In: Proceedings of the 27th international conference on computational linguistics. Association for Computational Linguistics, Santa Fe, New Mexico, USA, pp 3391\u20133401"},{"key":"880_CR20","unstructured":"Pew Research Center (2021) Social media fact sheet. https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/. Accessed 27 Sept 2020"},{"key":"880_CR25","doi-asserted-by":"crossref","unstructured":"Potthast M, Kiesel J, Reinartz K, Bevendorff J, Stein B (2018) A stylometric inquiry into hyperpartisan and fake news. In: Proceedings of the 56th annual meeting of the association for computational linguistics (vol 1: Long Papers). Melbourne, Australia: Association for Computational Linguistics, pp 231\u2013240","DOI":"10.18653\/v1\/P18-1022"},{"key":"880_CR27","unstructured":"Sanh V, Debut L, Chaumond J, Wolf T (2019) Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter, pp 1\u20135"},{"key":"880_CR28","unstructured":"Taylor K (2016) A viral rumor that mcdonald\u2019s uses ground worm filler in burgers has been debunked. https:\/\/www.businessinsider.in\/A-viral-rumor-that-McDonalds-uses-ground-worm-filler-in-burgers-has-been-debunked\/articleshow\/50676282.cms. Accessed 6 Oct 2020"},{"key":"880_CR29","unstructured":"Tchakount\u00e9 F, Amadou Calvin K, Ari AAA, Fotsa Mbogne DJ (2020) A smart contract logic to reduce hoax propagation across social media. J. King Saudi Univ - Comput Inf Sci, pp 1\u20139"},{"key":"880_CR30","doi-asserted-by":"crossref","unstructured":"Verma PK, Agrawal P (2020) Study and detection of fake news: $${P}^2{C}^2$$-based machine learning approach. In: 4th International conference on data management, analytics and innovation. Springer, Delhi, pp 261\u2013278","DOI":"10.1007\/978-981-15-5619-7_18"},{"key":"880_CR31","doi-asserted-by":"crossref","unstructured":"Walt EVD, Eloff J (2018) Using machine learning to detect fake identities: Bots vs humans. IEEE Access, pp 6540\u20136549","DOI":"10.1109\/ACCESS.2018.2796018"},{"key":"880_CR32","doi-asserted-by":"crossref","unstructured":"Wang AH (2010) Detecting spam bots in online social networking sites: a machine learning approach. In: Data and applications security and privacy XXIV. Springer, Berlin, pp 335\u2013342","DOI":"10.1007\/978-3-642-13739-6_25"},{"key":"880_CR33","unstructured":"Wani MA, Jabin S (2018) Mutual clustering coefficient-based suspicious-link detection approach for online social networks. J King Saudi Univ - Comput Inf Sci, pp 1\u201314"},{"key":"880_CR34","doi-asserted-by":"crossref","unstructured":"Wu K, Yang S, Zhu KQ (2015) False rumors detection on sina weibo by propagation structures. In: 2015 IEEE 31st international conference on data engineering, pp 651\u2013662","DOI":"10.1109\/ICDE.2015.7113322"},{"key":"880_CR35","unstructured":"Zhou Y, Chen K, Song L, Yang X, He J (2012) Feature analysis of spammers in social networks with active honeypots: a case study of chinese microblogging networks. In: International conference on advances in social networks analysis and mining. IEEE\/ACM, Istanbul, Turkey, pp 728\u2013729"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-022-00880-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-022-00880-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-022-00880-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,2]],"date-time":"2023-01-02T13:59:54Z","timestamp":1672667994000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-022-00880-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["880"],"URL":"https:\/\/doi.org\/10.1007\/s13278-022-00880-1","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"26 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors do not have any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"54"}}