留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

国际视野下治理虚假新闻的技术手段及相关模型

李净

李净. 国际视野下治理虚假新闻的技术手段及相关模型[J]. 中国传媒科技, 2021, (8): 17-21. doi: 10.19483/j.cnki.11-4653/n.2021.08.003
引用本文: 李净. 国际视野下治理虚假新闻的技术手段及相关模型[J]. 中国传媒科技, 2021, (8): 17-21. doi: 10.19483/j.cnki.11-4653/n.2021.08.003

国际视野下治理虚假新闻的技术手段及相关模型

doi: 10.19483/j.cnki.11-4653/n.2021.08.003
详细信息
    作者简介:

    李净(1983-),女,河南南阳,《中国传媒科技》杂志社编辑部主任,研究方向:新闻传播。

  • 中图分类号: G210

  • 摘要: 伴随着人工智能、社交媒体、大数据、VR/AR 等技术的进一步发展,假新闻混入信息的汪洋大海,无孔不入,难以辨别,引发了全球的传播危机、社会危机,已经成为一个不容忽视的议题。本文通过梳理目前治理虚假新闻的技术手段,总结国际经验,以求为国内打击虚假新闻、净化媒体环境、营造清朗的媒体空间提供参考和借鉴。

     

  • [1] Amrita,Bhattacharjee,舒凯,高旻,刘欢 . 网络信息生态系统中的虚假信息:检测、缓解与挑战 [J]. 计算机研究与发展,2021(7):1353-1365.
    [2] 张建中 . 治理假新闻:“后真相”时代欧洲国家的创新与实践 [J]. 新闻界,2017(06):95-101.
    [3] GILL S.Why Combatting Fake News Requires People And Technology—Working Together[EB/OL].(2019-09-15).https://www.knightfoundation.org/articles/whycombatting-fake-news-requires-people-and-technologyworking-together.
    [4] 华 商 网 . 人 工 智 能 是 虚 假 新 闻 的“ 克 星 ”[EB/OL].(2017-03-23)https://www.sohu.com/a/129892845_119659.
    [5] 蒋梦婷 . 虚假新闻检测技术的应用 [J]. 网络安全技术与应用,2021(04):54-55.
    [6] GuoBin,DingYasan,YaoLina,etal.Thefutureoffalse in formationdetectiononsocialmedia:Newperspectivesand trends[J].ACM ComputingSurveys,2020(4):68.
    [7] CastilloC,MendozaM,PobleteB.Informationcredibilityon Twitter[C]//ProcoftheWebConf2020.NewYork:ACM,2011:675-684
    [8] QazvinianV,RosengrenE,RadevD,etal.Rumorhasit:Identifyingmisinformationin microblogs[C]//Procofthe 2011 Conf on Empirical Methods in Natural Language Processing.Stroudsburg,PA:ACL,2011:1589-1599
    [9] Pérez G RosasV,KleinbergB,Lefevre A,etal.Automatic detectionoffakenews [EB/OL].(2017-08-23)[2020-10-08].https://arxiv.org/pdf/1708.07104.pdf .
    [10] MaJing,Gao Wei,MitraP,etal.Detectingrumorsfrom microblogswithrecurrentneuralnetworks[C]//Procofthe 25thIntJointConfon ArtificialIntelligence.MenloPark,CA:AAAI,2016:3818-3824.
    [11] 刘波,李洋,孟 青,等.社 交 媒 体 内 容 可 信 性 分 析 与 评 价 [J].计算机研究与发展,2019(9):19391952.
    [12] JinZhiwei,CaoJuan,JiangYugang,etal.Newscredibility evaluation on microblog with a hierarchical propagation model[C]//Procofthe2014IEEEIntConfonDataMining. Piscataway,NJ:IEEE,2014:230-239.
    [13] Jin Zhiwei,Cao Juan,Zhang Yongdong,et al.News certification by exploiting conflicting socialviewpointsin microblogs[C]//Procofthe30th AAAIConfon Artificial Intelligence.PaloAlto,CA:AAAI,2016:2972-2978.
    [14] ShuKai,WangSuhang,Liu Huan.Beyondnewscontents:Theroleofsocialcontextforfakenewsdetection[C]//Proc ofthe20thACMIntConfon WebSearchandDataMining. NewYork:ACM,2019:312-320.
    [15] MaJing,GaoWei,WongKF.RumordetectiononTwitter withtree G structuredrecursiveneuralnetworks[C]//Procof the 56th Annual Meeting of the Association for ComputationalLinguistics.Stroudsburg,PA:ACL,2018:1980-1989.
    [16] 虎嵩林,赵军,唐杰,秦兵,石川,颜水成 . 前言 [J].计算机研究与发展,2021,58(07):1351-1352.
    [17] NobleCC,CookDJ.Graph G basedanomalydetection[C]// Procofthe 9th ACM SIGKDD Int Confon Knowledge DiscoveryandData Mining.New York:ACM,2003:631,636.
    [18] SeoJ,Mendelevitch O.Identifyingfraudsandanomaliesin Medicare G Bdataset[C]//Procofthe39thAnnualIntConfof theIEEE Engineering in Medicine and Biology Society. Piscataway,NJ:IEEE,2017:3664-3667.
    [19] ColladonAF,RemondiE.Usingsocialnetworkanalysisto prevent money laundering [J]. Expert Systems with Applications,2017,67:4958 1451 .
    [20] ManjunathaH C,Mohanasundaram R.BRNADS:Bigdata real G timenodeanomalydetectioninsocialnetworks [C]// Procofthe2ndIntConfonInventiveSystemsandControl. Piscataway,NJ:IEEE,2018:929-932.
    [21] SánchezPI,MüllerE,LaforetF,etal.Statisticalselection ofcongruentsubspacesforminingattributedgraphs[C]// Procofthe13thIEEEIntConfonDataMining.Piscataway,NJ:IEEE,2013:647-656 .
    [22] SánchezP I,Müller E,Irmler O,etal.Localcontext selectionforoutlierrankingingraphswithmultiplenumeric nodeattributes[C]//Procofthe26thIntConfonScientific and Statistical Database Management.Piscataway,NJ:IEEE,2014:16.
    [23] PerozziB,AkogluL,SánchezPI,etal.Focusedclustering andoutlierdetectioninlargeattributedgraphs[C]//Procof the20th ACM SIGKDDIntConfon KnowledgeDiscovery andDataMining.NewYork:ACM,2014:1346-1355 .
    [24] DaiHanbo,ZhuFeida,Lim EP,etal.Detectinganomalies inbipartitegraphswithmutualdependencyprinciples[C]// ProcoftheIEEE12thIntConfonDataMining.Piscataway,NJ:IEEE,2012:171-180.
    [25] TsangS,Koh Y S,Dobbie G,etal.SPAN:Finding collaborativefraudsinonlineauctions[J].Knowledge G Based Systems,2014,71:389-408.
    [26] ShehnepoorS,SalehiM,FarahbakhshR,etal.Netspam:A network G based spam detection framework for reviewsin onlinesocialmedia[J].IEEE TransactionsonInformation ForensicsandSecurity,2017(7):1585-1595 .
    [27] CarvalhoLF M,TeixeiraCHC,MeiraW,etal.ProviderG consumeranomalydetectionforhealthcaresystems [C]// Procofthe IEEE Int Conf on Healthcare Informatics. Piscataway,NJ:IEEE,2017:229-238.
    [28] Ranshous S,Shen Shitian,Koutra D,et al.Anomaly detection in dynamic networks:A survey [J]. Wiley InterdisciplinaryReviews:ComputationalStatistics,2015,7 (3):223-247.
    [29] ManzoorE,MilajerdiSM,AkogluL.FastmemoryG efficient anomalydetectioninstreamingheterogeneousgraphs[C]// Procofthe22nd ACM SIGKDDIntConfon Knowledge DiscoveryandDataMining.New York:ACM,2016:1035 -1044 .
    [30] 陈波冯,李靖东,卢兴见,沙朝锋,王晓玲,张吉 . 基于深度学习的图异常检测技术综述 [J]. 计算机研究与发展,2021(7):1436-1455.
    [31] WuZhizheng,EvansN,Kinnunen T,etal.Spoofingand countermeasuresfor speaker verification:A survey [J].SpeechCommunication,2015:130-153.
    [32] 王成龙,易江燕,陶建华,马浩鑫,田正坤,傅睿博 . 基于全局 - 时频注意力网络的语音伪造检测 [J]. 计算机研究与发展,2021(7):1466-1475.
    [33] 亓鹏,曹娟,盛强 . 语义增强的多模态虚假新闻检测 [J]. 计算机研究与发展,2021(7):1456-1465.
    [34] Amrita,Bhattacharjee,舒凯,高旻,刘欢 . 网络信息生态系统中的虚假信息:检测、缓解与挑战 [J]. 计算机研究与发展,2021(7):1353-1365.
    [35] 吴 果 中, 李 泰 儒 . 用 区 块 链 技 术 打 击 虚 假 新 闻 ——Userfeeds 与 PressCoin 模式介绍 [J]. 新闻战线,2018(13):88-90.
  • 加载中
计量
  • 文章访问数:  502
  • HTML全文浏览量:  91
  • PDF下载量:  32
  • 被引次数: 0
出版历程
  • 收稿日期:  2021-07-07
  • 修回日期:  2021-08-10
  • 网络出版日期:  2022-03-21
  • 刊出日期:  2021-08-15

目录

    /

    返回文章
    返回