{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:23:38Z","timestamp":1730298218350,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1109\/sose58276.2023.00038","type":"proceedings-article","created":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T18:06:19Z","timestamp":1695665179000},"page":"272-279","source":"Crossref","is-referenced-by-count":1,"title":["Classifying Real and Bot Users Based on their News Spread for Combating Misinformation"],"prefix":"10.1109","author":[{"given":"Thi","family":"Bui","sequence":"first","affiliation":[{"name":"San José State University,Department of Computer Science,San Jose,CA,United States"}]},{"given":"Anson","family":"Pham","sequence":"additional","affiliation":[{"name":"San José State University,Department of Computer Science,San Jose,CA,United States"}]},{"given":"Warada","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"San José State University,Department of Computer Science,San Jose,CA,United States"}]},{"given":"Yutong","family":"Yao","sequence":"additional","affiliation":[{"name":"San José State University,Department of Computer Science,San Jose,CA,United States"}]},{"given":"Katerina","family":"Potika","sequence":"additional","affiliation":[{"name":"San José State University,Department of Computer Science,San Jose,CA,United States"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/2872518.2889302"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2823465.2823467"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1963405.1963500"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/SP.2012.34"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1155\/2020\/8885861"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ASONAM.2018.8508520"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3132847.3132877"},{"key":"ref16","first-page":"3818","article-title":"Detecting rumors from microblogs with recurrent neural networks","volume":"16","author":"ma","year":"2016","journal-title":"IJCAI"},{"key":"ref19","first-page":"10","article-title":"Fake news detection: a deep learning approach","volume":"1","author":"thota","year":"2018","journal-title":"SMU Data Science Review"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.3390\/info12010038"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/MIS.2016.29"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/3459637.3482019"},{"year":"2020","author":"ragesh","journal-title":"HeteGCN Heterogeneous Graph Convolutional Networks for Text Classification","key":"ref48"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1016\/j.ins.2013.11.016"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/HPCS.2010.5547109"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/IranianCEE.2014.6999833"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1609\/aaai.v34i01.5460"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1126\/science.aap9559"},{"year":"2023","author":"feng","journal-title":"Twibot-22 Towards graph-based twitter bot detection","key":"ref49"},{"key":"ref8","first-page":"69","article-title":"Efficient natural language processing with spacy","author":"honnibal","year":"0","journal-title":"Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics Volume 2 Short Papers"},{"year":"2019","author":"devlin","journal-title":"BERT Pre-training of deep bidirectional transformers for language understanding","key":"ref7"},{"key":"ref9","article-title":"Twibot-22: Towards graph-based twitter bot detection","author":"feng","year":"2022","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.5210\/fm.v25i6.10633"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.2105\/AJPH.2018.304567"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3041021.3055135"},{"year":"2016","author":"kollanyi","journal-title":"Bots and automation over twitter during the us election","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/3366423.3380180"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/GC46384.2019.00021"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.dss.2021.113633"},{"year":"2021","author":"suzumura","journal-title":"Global data science project for covid-19","key":"ref37"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1007\/s11416-011-0152-x"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1371\/journal.pone.0256039"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.18653\/v1\/P19-1247"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3340531.3412046"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/3357384.3357994"},{"year":"2017","author":"glaser","journal-title":"Internet traffic from bots surpassed human-generated traffic in 2016","key":"ref2"},{"year":"0","author":"heidari","journal-title":"Online User Profiling to Detect Social Bots on Twitter","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/s42979-021-00775-6"},{"year":"2020","author":"qi","journal-title":"A Python Natural Language Processing Toolkit for Many Human Languages","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3451215"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-030-32233-5_54"},{"key":"ref26","article-title":"Roberta: A robustly optimized bert pretraining approach","author":"liu","year":"2019","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/978-3-030-75762-5_33"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ASONAM55673.2022.10068653"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.3390\/fi14030070"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SNAMS52053.2020.9336542"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/IJCNN52387.2021.9534185"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.3390\/sym14010030"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1609\/aaai.v34i01.5393","article-title":"Rumor detection on social media with bidirectional graph convolutional networks","volume":"34","author":"bian","year":"0","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"}],"event":{"name":"2023 IEEE International Conference on Service-Oriented System Engineering (SOSE)","start":{"date-parts":[[2023,7,17]]},"location":"Athens, Greece","end":{"date-parts":[[2023,7,20]]}},"container-title":["2023 IEEE International Conference on Service-Oriented System Engineering (SOSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10254733\/10254738\/10254769.pdf?arnumber=10254769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:49:42Z","timestamp":1697478582000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10254769\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/sose58276.2023.00038","relation":{},"subject":[],"published":{"date-parts":[[2023,7]]}}}