Issue 8
Aug.  2021
Turn off MathJax
Article Contents

doi: 10.19483/j.cnki.11-4653/n.2021.08.003
  • Received Date: 2021-07-07
  • Rev Recd Date: 2021-08-10
  • Available Online: 2022-03-21
  • Publish Date: 2021-08-15
  • loading
  • [1]
    Amrita,Bhattacharjee,舒凯,高旻,刘欢 . 网络信息生态系统中的虚假信息:检测、缓解与挑战 [J]. 计算机研究与发展,2021(7):1353-1365.
    [2]
    张建中 . 治理假新闻:“后真相”时代欧洲国家的创新与实践 [J]. 新闻界,2017(06):95-101.
    [3]
    GILL S.Why Combatting Fake News Requires People And Technology—Working Together[EB/OL].(2019-09-15).https://www.knightfoundation.org/articles/whycombatting-fake-news-requires-people-and-technologyworking-together.
    [4]
    华 商 网 . 人 工 智 能 是 虚 假 新 闻 的“ 克 星 ”[EB/OL].(2017-03-23)https://www.sohu.com/a/129892845_119659.
    [5]
    蒋梦婷 . 虚假新闻检测技术的应用 [J]. 网络安全技术与应用,2021(04):54-55.
    [6]
    GuoBin,DingYasan,YaoLina,etal.Thefutureoffalse in formationdetectiononsocialmedia:Newperspectivesand trends[J].ACM ComputingSurveys,2020(4):68.
    [7]
    CastilloC,MendozaM,PobleteB.Informationcredibilityon Twitter[C]//ProcoftheWebConf2020.NewYork:ACM,2011:675-684
    [8]
    QazvinianV,RosengrenE,RadevD,etal.Rumorhasit:Identifyingmisinformationin microblogs[C]//Procofthe 2011 Conf on Empirical Methods in Natural Language Processing.Stroudsburg,PA:ACL,2011:1589-1599
    [9]
    Pérez G RosasV,KleinbergB,Lefevre A,etal.Automatic detectionoffakenews [EB/OL].(2017-08-23)[2020-10-08].https://arxiv.org/pdf/1708.07104.pdf .
    [10]
    MaJing,Gao Wei,MitraP,etal.Detectingrumorsfrom microblogswithrecurrentneuralnetworks[C]//Procofthe 25thIntJointConfon ArtificialIntelligence.MenloPark,CA:AAAI,2016:3818-3824.
    [11]
    刘波,李洋,孟 青,等.社 交 媒 体 内 容 可 信 性 分 析 与 评 价 [J].计算机研究与发展,2019(9):19391952.
    [12]
    JinZhiwei,CaoJuan,JiangYugang,etal.Newscredibility evaluation on microblog with a hierarchical propagation model[C]//Procofthe2014IEEEIntConfonDataMining. Piscataway,NJ:IEEE,2014:230-239.
    [13]
    Jin Zhiwei,Cao Juan,Zhang Yongdong,et al.News certification by exploiting conflicting socialviewpointsin microblogs[C]//Procofthe30th AAAIConfon Artificial Intelligence.PaloAlto,CA:AAAI,2016:2972-2978.
    [14]
    ShuKai,WangSuhang,Liu Huan.Beyondnewscontents:Theroleofsocialcontextforfakenewsdetection[C]//Proc ofthe20thACMIntConfon WebSearchandDataMining. NewYork:ACM,2019:312-320.
    [15]
    MaJing,GaoWei,WongKF.RumordetectiononTwitter withtree G structuredrecursiveneuralnetworks[C]//Procof the 56th Annual Meeting of the Association for ComputationalLinguistics.Stroudsburg,PA:ACL,2018:1980-1989.
    [16]
    虎嵩林,赵军,唐杰,秦兵,石川,颜水成 . 前言 [J].计算机研究与发展,2021,58(07):1351-1352.
    [17]
    NobleCC,CookDJ.Graph G basedanomalydetection[C]// Procofthe 9th ACM SIGKDD Int Confon Knowledge DiscoveryandData Mining.New York:ACM,2003:631,636.
    [18]
    SeoJ,Mendelevitch O.Identifyingfraudsandanomaliesin Medicare G Bdataset[C]//Procofthe39thAnnualIntConfof theIEEE Engineering in Medicine and Biology Society. Piscataway,NJ:IEEE,2017:3664-3667.
    [19]
    ColladonAF,RemondiE.Usingsocialnetworkanalysisto prevent money laundering [J]. Expert Systems with Applications,2017,67:4958 1451 .
    [20]
    ManjunathaH C,Mohanasundaram R.BRNADS:Bigdata real G timenodeanomalydetectioninsocialnetworks [C]// Procofthe2ndIntConfonInventiveSystemsandControl. Piscataway,NJ:IEEE,2018:929-932.
    [21]
    SánchezPI,MüllerE,LaforetF,etal.Statisticalselection ofcongruentsubspacesforminingattributedgraphs[C]// Procofthe13thIEEEIntConfonDataMining.Piscataway,NJ:IEEE,2013:647-656 .
    [22]
    SánchezP I,Müller E,Irmler O,etal.Localcontext selectionforoutlierrankingingraphswithmultiplenumeric nodeattributes[C]//Procofthe26thIntConfonScientific and Statistical Database Management.Piscataway,NJ:IEEE,2014:16.
    [23]
    PerozziB,AkogluL,SánchezPI,etal.Focusedclustering andoutlierdetectioninlargeattributedgraphs[C]//Procof the20th ACM SIGKDDIntConfon KnowledgeDiscovery andDataMining.NewYork:ACM,2014:1346-1355 .
    [24]
    DaiHanbo,ZhuFeida,Lim EP,etal.Detectinganomalies inbipartitegraphswithmutualdependencyprinciples[C]// ProcoftheIEEE12thIntConfonDataMining.Piscataway,NJ:IEEE,2012:171-180.
    [25]
    TsangS,Koh Y S,Dobbie G,etal.SPAN:Finding collaborativefraudsinonlineauctions[J].Knowledge G Based Systems,2014,71:389-408.
    [26]
    ShehnepoorS,SalehiM,FarahbakhshR,etal.Netspam:A network G based spam detection framework for reviewsin onlinesocialmedia[J].IEEE TransactionsonInformation ForensicsandSecurity,2017(7):1585-1595 .
    [27]
    CarvalhoLF M,TeixeiraCHC,MeiraW,etal.ProviderG consumeranomalydetectionforhealthcaresystems [C]// Procofthe IEEE Int Conf on Healthcare Informatics. Piscataway,NJ:IEEE,2017:229-238.
    [28]
    Ranshous S,Shen Shitian,Koutra D,et al.Anomaly detection in dynamic networks:A survey [J]. Wiley InterdisciplinaryReviews:ComputationalStatistics,2015,7 (3):223-247.
    [29]
    ManzoorE,MilajerdiSM,AkogluL.FastmemoryG efficient anomalydetectioninstreamingheterogeneousgraphs[C]// Procofthe22nd ACM SIGKDDIntConfon Knowledge DiscoveryandDataMining.New York:ACM,2016:1035 -1044 .
    [30]
    陈波冯,李靖东,卢兴见,沙朝锋,王晓玲,张吉 . 基于深度学习的图异常检测技术综述 [J]. 计算机研究与发展,2021(7):1436-1455.
    [31]
    WuZhizheng,EvansN,Kinnunen T,etal.Spoofingand countermeasuresfor speaker verification:A survey [J].SpeechCommunication,2015:130-153.
    [32]
    王成龙,易江燕,陶建华,马浩鑫,田正坤,傅睿博 . 基于全局 - 时频注意力网络的语音伪造检测 [J]. 计算机研究与发展,2021(7):1466-1475.
    [33]
    亓鹏,曹娟,盛强 . 语义增强的多模态虚假新闻检测 [J]. 计算机研究与发展,2021(7):1456-1465.
    [34]
    Amrita,Bhattacharjee,舒凯,高旻,刘欢 . 网络信息生态系统中的虚假信息:检测、缓解与挑战 [J]. 计算机研究与发展,2021(7):1353-1365.
    [35]
    吴 果 中, 李 泰 儒 . 用 区 块 链 技 术 打 击 虚 假 新 闻 ——Userfeeds 与 PressCoin 模式介绍 [J]. 新闻战线,2018(13):88-90.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (444) PDF downloads(26) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return