Author:
Sailunaz Kashfia,Kawash Jalal,Alhajj Reda
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference43 articles.
1. Ahsan M, Kumari M, Sharma TP (2019) Detection of context-varying rumors on Twitter through deep learning. Int J Adv Sci Technol 128:45–58
2. Allport GW, Postman LJ (1945) Section of psychology: The basic psychology of rumor. Transactions of the New York Academy of Sciences 8(2 Series II):61–81
3. Arya A, Hine M, Khataei A (2018) User trust graph: A model to measure trustworthiness. In: Proceedings of the Personalization in Persuasive Technology Workshop, Persuasive Technology 2018, Waterloo, Canada (ir.library.carleton.ca)
4. Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th international conference on World wide web. ACM, pp 675–684
5. Cresci S, Lillo F, Regoli D, Tardelli S, Tesconi M (2019) Cashtag piggybacking: Uncovering spam and bot activity in stock microblogs on twitter. ACM Trans Web (TWEB) 13(2):1–27
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献