{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:05:08Z","timestamp":1740099908901,"version":"3.37.3"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1742702,1820609,1909702,1915801,1934782,IIS1909702"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1109\/icdm50108.2020.00037","type":"proceedings-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T15:08:40Z","timestamp":1612969720000},"page":"282-291","source":"Crossref","is-referenced-by-count":32,"title":["MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models"],"prefix":"10.1109","author":[{"given":"Thai","family":"Le","sequence":"first","affiliation":[]},{"given":"Suhang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dongwon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5220\/0007566307940800"},{"key":"ref33","article-title":"RelGAN: Relational Generative Adversarial Networks for Text Generation","author":"weili nie","year":"0","journal-title":"ICLR'19"},{"journal-title":"Learning multi-level dependencies for robust word recognition","year":"2019","author":"wang","key":"ref32"},{"journal-title":"Universal adversarial triggers for nlp","year":"2019","author":"wallace","key":"ref31"},{"key":"ref30","article-title":"Attention is all you need","author":"vaswani","year":"0","journal-title":"NIPS 17"},{"key":"ref37","article-title":"FAKEDETECTOR: Effective fake news detection with deep diffusive neural network","author":"zhang","year":"0","journal-title":"ICDERS-20"},{"journal-title":"Defending against neural fake news","year":"2019","author":"zellers","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"},{"key":"ref34","article-title":"SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient","author":"yu","year":"0","journal-title":"AAAI'17"},{"journal-title":"c-TextGen Conditional Text Generation for Harmonious Human-Machine Interaction","year":"0","author":"guo","key":"ref10"},{"journal-title":"Disinformation and Influence Campaigns on Twitter","year":"2018","author":"hindman","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3363818"},{"key":"ref13","article-title":"Toward controlled generation of text","author":"hu","year":"0","journal-title":"ICML'17"},{"journal-title":"Categorical reparameterization with gumbel-softmax","year":"2016","author":"jang","key":"ref14"},{"journal-title":"The relativistic discriminator A key element missing from standard GAN","year":"2018","author":"jolicoeur-martineau","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref17","article-title":"All-in-one: Multi-task learning for rumour verification","author":"kochkina","year":"0","journal-title":"ACL'18"},{"key":"ref18","article-title":"Professor forcing: A new algorithm for training recurrent networks","author":"lamb","year":"0","journal-title":"NIPS 16"},{"key":"ref19","article-title":"5 sources of clickbaits you should know! using synthetic clickbaits to improve prediction and distinguish between bot-generated and human-written headlines","author":"le","year":"0","journal-title":"IEEE\/ACM ASONAM"},{"journal-title":"FakeNewsNet A data repository with news content social context and dynamic information for studying fake news on social media","year":"2018","author":"shu","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342894"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330935"},{"journal-title":"Universal sentence encoder","year":"2018","author":"cer","key":"ref3"},{"journal-title":"Social Clicks What and Who Gets Read on Twitter?","year":"2016","author":"gabielkov","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00062"},{"journal-title":"Hotflip White-box adversarial examples for text classification","year":"2017","author":"ebrahimi","key":"ref5"},{"key":"ref8","article-title":"Generative adversarial nets","author":"goodfellow","year":"0","journal-title":"NIPS 14"},{"journal-title":"Deep Learning","year":"2016","author":"goodfellow","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.aay3539"},{"journal-title":"Explaining and Harnessing Adversarial Examples","year":"2014","author":"goodfellow","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.171"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23138"},{"journal-title":"The development and psychometric properties of LIWC2015","year":"2015","author":"pennebaker","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/533"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P19-1561"},{"key":"ref26","article-title":"Relational recurrent neural networks","author":"santoro","year":"0","journal-title":"NIPS 18"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132877"}],"event":{"name":"2020 IEEE International Conference on Data Mining (ICDM)","start":{"date-parts":[[2020,11,17]]},"location":"Sorrento, Italy","end":{"date-parts":[[2020,11,20]]}},"container-title":["2020 IEEE International Conference on Data Mining (ICDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9338245\/9338248\/09338282.pdf?arnumber=9338282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:08:11Z","timestamp":1656374891000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9338282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icdm50108.2020.00037","relation":{},"subject":[],"published":{"date-parts":[[2020,11]]}}}