-
摘要: 伴随着人工智能、社交媒体、大数据、VR/AR 等技术的进一步发展,假新闻混入信息的汪洋大海,无孔不入,难以辨别,引发了全球的传播危机、社会危机,已经成为一个不容忽视的议题。本文通过梳理目前治理虚假新闻的技术手段,总结国际经验,以求为国内打击虚假新闻、净化媒体环境、营造清朗的媒体空间提供参考和借鉴。
-
[1] Amrita,Bhattacharjee,舒凯,高旻,刘欢 . 网络信息生态系统中的虚假信息:检测、缓解与挑战 [J]. 计算机研究与发展,2021(7):1353-1365. [2] 张建中 . 治理假新闻:“后真相”时代欧洲国家的创新与实践 [J]. 新闻界,2017(06):95-101. [3] GILL S.Why Combatting Fake News Requires People And Technology—Working Together[EB/OL].(2019-09-15).https://www.knightfoundation.org/articles/whycombatting-fake-news-requires-people-and-technologyworking-together. [4] 华 商 网 . 人 工 智 能 是 虚 假 新 闻 的“ 克 星 ”[EB/OL].(2017-03-23)https://www.sohu.com/a/129892845_119659. [5] 蒋梦婷 . 虚假新闻检测技术的应用 [J]. 网络安全技术与应用,2021(04):54-55. [6] GuoBin,DingYasan,YaoLina,etal.Thefutureoffalse in formationdetectiononsocialmedia:Newperspectivesand trends[J].ACM ComputingSurveys,2020(4):68. [7] CastilloC,MendozaM,PobleteB.Informationcredibilityon Twitter[C]//ProcoftheWebConf2020.NewYork:ACM,2011:675-684 [8] QazvinianV,RosengrenE,RadevD,etal.Rumorhasit:Identifyingmisinformationin microblogs[C]//Procofthe 2011 Conf on Empirical Methods in Natural Language Processing.Stroudsburg,PA:ACL,2011:1589-1599 [9] Pérez G RosasV,KleinbergB,Lefevre A,etal.Automatic detectionoffakenews [EB/OL].(2017-08-23)[2020-10-08].https://arxiv.org/pdf/1708.07104.pdf . [10] MaJing,Gao Wei,MitraP,etal.Detectingrumorsfrom microblogswithrecurrentneuralnetworks[C]//Procofthe 25thIntJointConfon ArtificialIntelligence.MenloPark,CA:AAAI,2016:3818-3824. [11] 刘波,李洋,孟 青,等.社 交 媒 体 内 容 可 信 性 分 析 与 评 价 [J].计算机研究与发展,2019(9):19391952. [12] JinZhiwei,CaoJuan,JiangYugang,etal.Newscredibility evaluation on microblog with a hierarchical propagation model[C]//Procofthe2014IEEEIntConfonDataMining. Piscataway,NJ:IEEE,2014:230-239. [13] Jin Zhiwei,Cao Juan,Zhang Yongdong,et al.News certification by exploiting conflicting socialviewpointsin microblogs[C]//Procofthe30th AAAIConfon Artificial Intelligence.PaloAlto,CA:AAAI,2016:2972-2978. [14] ShuKai,WangSuhang,Liu Huan.Beyondnewscontents:Theroleofsocialcontextforfakenewsdetection[C]//Proc ofthe20thACMIntConfon WebSearchandDataMining. NewYork:ACM,2019:312-320. [15] MaJing,GaoWei,WongKF.RumordetectiononTwitter withtree G structuredrecursiveneuralnetworks[C]//Procof the 56th Annual Meeting of the Association for ComputationalLinguistics.Stroudsburg,PA:ACL,2018:1980-1989. [16] 虎嵩林,赵军,唐杰,秦兵,石川,颜水成 . 前言 [J].计算机研究与发展,2021,58(07):1351-1352. [17] NobleCC,CookDJ.Graph G basedanomalydetection[C]// Procofthe 9th ACM SIGKDD Int Confon Knowledge DiscoveryandData Mining.New York:ACM,2003:631,636. [18] SeoJ,Mendelevitch O.Identifyingfraudsandanomaliesin Medicare G Bdataset[C]//Procofthe39thAnnualIntConfof theIEEE Engineering in Medicine and Biology Society. Piscataway,NJ:IEEE,2017:3664-3667. [19] ColladonAF,RemondiE.Usingsocialnetworkanalysisto prevent money laundering [J]. Expert Systems with Applications,2017,67:4958 1451 . [20] ManjunathaH C,Mohanasundaram R.BRNADS:Bigdata real G timenodeanomalydetectioninsocialnetworks [C]// Procofthe2ndIntConfonInventiveSystemsandControl. Piscataway,NJ:IEEE,2018:929-932. [21] SánchezPI,MüllerE,LaforetF,etal.Statisticalselection ofcongruentsubspacesforminingattributedgraphs[C]// Procofthe13thIEEEIntConfonDataMining.Piscataway,NJ:IEEE,2013:647-656 . [22] SánchezP I,Müller E,Irmler O,etal.Localcontext selectionforoutlierrankingingraphswithmultiplenumeric nodeattributes[C]//Procofthe26thIntConfonScientific and Statistical Database Management.Piscataway,NJ:IEEE,2014:16. [23] PerozziB,AkogluL,SánchezPI,etal.Focusedclustering andoutlierdetectioninlargeattributedgraphs[C]//Procof the20th ACM SIGKDDIntConfon KnowledgeDiscovery andDataMining.NewYork:ACM,2014:1346-1355 . [24] DaiHanbo,ZhuFeida,Lim EP,etal.Detectinganomalies inbipartitegraphswithmutualdependencyprinciples[C]// ProcoftheIEEE12thIntConfonDataMining.Piscataway,NJ:IEEE,2012:171-180. [25] TsangS,Koh Y S,Dobbie G,etal.SPAN:Finding collaborativefraudsinonlineauctions[J].Knowledge G Based Systems,2014,71:389-408. [26] ShehnepoorS,SalehiM,FarahbakhshR,etal.Netspam:A network G based spam detection framework for reviewsin onlinesocialmedia[J].IEEE TransactionsonInformation ForensicsandSecurity,2017(7):1585-1595 . [27] CarvalhoLF M,TeixeiraCHC,MeiraW,etal.ProviderG consumeranomalydetectionforhealthcaresystems [C]// Procofthe IEEE Int Conf on Healthcare Informatics. Piscataway,NJ:IEEE,2017:229-238. [28] Ranshous S,Shen Shitian,Koutra D,et al.Anomaly detection in dynamic networks:A survey [J]. Wiley InterdisciplinaryReviews:ComputationalStatistics,2015,7 (3):223-247. [29] ManzoorE,MilajerdiSM,AkogluL.FastmemoryG efficient anomalydetectioninstreamingheterogeneousgraphs[C]// Procofthe22nd ACM SIGKDDIntConfon Knowledge DiscoveryandDataMining.New York:ACM,2016:1035 -1044 . [30] 陈波冯,李靖东,卢兴见,沙朝锋,王晓玲,张吉 . 基于深度学习的图异常检测技术综述 [J]. 计算机研究与发展,2021(7):1436-1455. [31] WuZhizheng,EvansN,Kinnunen T,etal.Spoofingand countermeasuresfor speaker verification:A survey [J].SpeechCommunication,2015:130-153. [32] 王成龙,易江燕,陶建华,马浩鑫,田正坤,傅睿博 . 基于全局 - 时频注意力网络的语音伪造检测 [J]. 计算机研究与发展,2021(7):1466-1475. [33] 亓鹏,曹娟,盛强 . 语义增强的多模态虚假新闻检测 [J]. 计算机研究与发展,2021(7):1456-1465. [34] Amrita,Bhattacharjee,舒凯,高旻,刘欢 . 网络信息生态系统中的虚假信息:检测、缓解与挑战 [J]. 计算机研究与发展,2021(7):1353-1365. [35] 吴 果 中, 李 泰 儒 . 用 区 块 链 技 术 打 击 虚 假 新 闻 ——Userfeeds 与 PressCoin 模式介绍 [J]. 新闻战线,2018(13):88-90.
点击查看大图
计量
- 文章访问数: 502
- HTML全文浏览量: 91
- PDF下载量: 32
- 被引次数: 0