[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3460620.3460753acmotherconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

Fake News Detection Using Machine Learning Methods

Published: 04 June 2021 Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the DATA 2021 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

Abstract

The paper is about the detection of unauthenticated news using Machine-learning methods with different algorithms. There is lot of scope to check the reality of the news received from various sources like websites, blogs, e-content. To identify the fake news, there is a need of some application in real time. Many methods were proposed earlier to observe fake news such as style-based, propagation-based and user-based. Automatic fake news detection application can be generated using natural language processing, information retrieval techniques, as well as graph theory. Language modeling is used to predict the missing or next word in a sentence based on the context. It is believed that mainstream media platforms are publishing fake news to grasp the attention of readers; most likely, it is done to increase the number of visitors on that particular page so that with an increasing number of visitors the page could claim more advertisement. This paper proposes an efficient method to detect fake news with better accuracy by using the available data set to detect the news is FAKE or REAL. Various methods are used for collecting the data and the data mining techniques are applied to clean and visualize it. Data mining helps to differentiate between the qualities of data depending upon its properties. The performance of detecting news only from the body of news is not sufficient but also social engagements should be considered. The objective of the work is to provide end-users with a robust solution so that they can figure out phishy and misguiding information. This technique combines the title and the body of the news to predict fake news more efficiently. The application is concerned with finding a result that could be used to identify fake news to help users.

References

[1]
Vasu Agarwal, H. Parveen Sultana, Srijan Malhotra, and Amitrajit Sarkar. 2019. Analysis of Classifiers for Fake News Detection. Procedia Computer Science 165 (2019), 377–383. https://doi.org/10.1016/j.procs.2020.01.035
[2]
Sajjad Ahmed, Knut Hinkelmann, and Flavio Corradini. 2020. Development of Fake News Model Using Machine Learning through Natural Language Processing. International Journal of Computer and Information Engineering 14, 12 (Nov. 2020), 454–460. https://publications.waset.org/10011624/development-of-fake-news-model-using-machine-learning-through-natural-language-processing
[3]
Monther Aldwairi and Ali Alwahedi. 2018. Detecting Fake News in Social Media Networks. Procedia Computer Science 141 (2018), 215–222. https://doi.org/10.1016/j.procs.2018.10.171
[4]
S.A. Aljawarneh, V. Radhakrishna, and J.W. Atwood. 2018. Ultimate - Unearthing latent time profiled temporal associations. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280025 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.
[5]
S.A. Aljawarneh, V. Radhakrishna, and J.W. Atwood. 2020. Ultimate: Unearthing Latent Time Profiled Temporal Associations. Foundations of Science 25, 4 (2020), 1147–1171. https://doi.org/10.1007/s10699-019-09594-8
[6]
S.A. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2018. Extending the Gaussian membership function for finding similarity between temporal patterns. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–6. https://doi.org/10.1109/ICEMIS.2017.8273100 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.
[7]
S. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2018. Vrksha – A novel multi-tree based sequential approach for seasonal pattern mining. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234735 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.
[8]
S. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2019. Nirnayam - Fusion of iterative rule based decisions to build decision trees for efficient classification. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330458 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.
[9]
S.A. Aljawarneh, V. Radhakrishna, and A. Cheruvu. 2020. VRKSHA: a novel tree structure for time-profiled temporal association mining. Neural Computing and Applications 32, 21 (2020), 16337–16365. https://doi.org/10.1007/s00521-018-3776-7
[10]
S.A. Aljawarneh, V. Radhakrishna, and G.R. Kumar. 2018. A fuzzy measure for intrusion and anomaly detection. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–6. https://doi.org/10.1109/ICEMIS.2017.8273113 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.
[11]
S. Aljawarneh, V. Radhakrishna, and G.R. Kumar. 2019. An imputation measure for data imputation and disease classification of medical datasets. AIP Conference Proceedings 2146 (2019). https://doi.org/10.1063/1.5123688 Conference of 1st International Conference on Key Enabling Technologies, KEYTECH 2019 ; Conference Date: 24 April 2019 Through 26 April 2019; Conference Code:150894.
[12]
S. Aljawarneh, V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A similarity measure for temporal pattern discovery in time series data generated by IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745355 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.
[13]
S. Aljawarneh, V. Radhakrishna, and G.S. Reddy. 2018. MANTRA - A novel imputation measure for disease classification and prediction. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280021 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.
[14]
S.A. Aljawarneh and R. Vangipuram. 2020. GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. Journal of Supercomputing 76, 6 (2020), 4376–4413. https://doi.org/10.1007/s11227-018-2397-3
[15]
S.A. Aljawarneh, R. Vangipuram, V.K. Puligadda, and J. Vinjamuri. 2017. G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things. Future Generation Computer Systems 74 (2017), 430–443. https://doi.org/10.1016/j.future.2017.01.013
[16]
Shadi A. Aljawarneh, Ali Alawneh, and Reem Jaradat. 2017. Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems 74 (Sept. 2017), 385–392. https://doi.org/10.1016/j.future.2016.10.005
[17]
Shadi A. Aljawarneh, Raja A. Moftah, and Abdelsalam M. Maatuk. 2016. Investigations of automatic methods for detecting the polymorphic worms signatures. Future Generation Computer Systems 60 (July 2016), 67–77. https://doi.org/10.1016/j.future.2016.01.020
[18]
Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. Comput. Surveys 41, 3 (July 2009), 1–58. https://doi.org/10.1145/1541880.1541882
[19]
A. Cheruvu and V. Radhakrishna. 2016. Estimating temporal pattern bounds using negative support computations. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745352 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.
[20]
A. Cheruvu, V. Radhakrishna, and N. Rajasekhar. 2018. Using normal distribution to retrieve temporal associations by Euclidean distance. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–3. https://doi.org/10.1109/ICEMIS.2017.8273101 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.
[21]
Nadia K. Conroy, Victoria L. Rubin, and Yimin Chen. 2015. Automatic deception detection: Methods for finding fake news. Proceedings of the Association for Information Science and Technology 52, 1 (Jan. 2015), 1–4. https://doi.org/10.1002/pra2.2015.145052010082
[22]
Rajesh Kumar Gunupudi, Mangathayaru Nimmala, Narsimha Gugulothu, and Suresh Reddy Gali. 2017. CLAPP: A self constructing feature clustering approach for anomaly detection. Future Generation Computer Systems 74 (2017), 417–429. https://doi.org/10.1016/j.future.2016.12.040
[23]
Yaser Khamayseh, Wail Mardini, Shadi Aljawarneh, and Muneer Bani Yassein. 2015. Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture. International Journal of Information and Communication Technology Education 11, 1 (Jan. 2015), 60–74. https://doi.org/10.4018/ijicte.2015010104
[24]
Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An Approach for Intrusion Detection Using Text Mining Techniques. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 63, 6 pages. https://doi.org/10.1145/2832987.2833076
[25]
Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An Improved K-Means Clustering Algorithm for Intrusion Detection Using Gaussian Function. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 69, 7 pages. https://doi.org/10.1145/2832987.2833082
[26]
G. Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2019. Similarity Function for Intrusion Detection. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 28, 4 pages. https://doi.org/10.1145/3330431.3330460
[27]
Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, and Aravind Cheruvu. 2018. Feature Clustering for Anomaly Detection Using Improved Fuzzy Membership Function. In Proceedings of the Fourth International Conference on Engineering and MIS 2018(Istanbul, Turkey) (ICEMIS ’18). Association for Computing Machinery, New York, NY, USA, Article 35, 9 pages. https://doi.org/10.1145/3234698.3234733
[28]
Arun Nagaraja, Shadi Aljawarneh, and Prabhakara H. S. 2018. PAREEKSHA: a machine learning approach for intrusion and anomaly detection. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems. ACM, Madrid Spain, 1–6. https://doi.org/10.1145/3279996.3280032
[29]
Arun Nagaraja, Uma Boregowda, Khalaf Khatatneh, Radhakrishna Vangipuram, Rajasekhar Nuvvusetty, and V. Sravan Kiran. 2020. Similarity Based Feature Transformation for Network Anomaly Detection. IEEE Access 8(2020), 39184–39196. https://doi.org/10.1109/ACCESS.2020.2975716
[30]
A. Nagaraja, U. Boregowda, K. Khatatneh, R. Vangipuram, R. Nuvvusetty, and V. Sravan Kiran. 2020. Similarity Based Feature Transformation for Network Anomaly Detection. IEEE Access 8(2020), 39184–39196. https://doi.org/10.1109/ACCESS.2020.2975716
[31]
Arun Nagaraja, V. Sravan Kiran, Prabhakara H. S, and N. Rajasekhar. 2018. A membership function for intrusion and anomaly detection of low frequency attacks. In Proceedings of the First International Conference on Data Science, E-learning and Information Systems. ACM, Madrid Spain, 1–6. https://doi.org/10.1145/3279996.3280031
[32]
Arun Nagaraja and T. Satish Kumar. 2018. An Extensive Survey on Intrusion Detection- Past, Present, Future. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 - ICEMIS ’18. ACM Press, Istanbul, Turkey, 1–9. https://doi.org/10.1145/3234698.3234743
[33]
Arun Nagaraja and T. Satish Kumar. 2018. A Membership Function for Feature Clustering Based Network Intrusion and Anomaly Detection. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 - ICEMIS ’18. ACM Press, Istanbul, Turkey, 1–6. https://doi.org/10.1145/3234698.3234720
[34]
Arun Nagaraja, Nimmala Mangathayaru, N Rajashekar, and T Satish Kumar. 2016. A survey on routing techniques for transmission of packets in networks. In 2016 International Conference on Engineering & MIS (ICEMIS). IEEE, Agadir, Morocco, 1–6. https://doi.org/10.1109/ICEMIS.2016.7745349
[35]
Arun Nagaraja and B. Uma. 2019. A generalized research study on distance measures, learning algorithms and datasets. In Proceedings of the 5th International Conference on Engineering and MIS. ACM, Astana Kazakhstan, 1–7. https://doi.org/10.1145/3330431.3330466
[36]
Arun Nagaraja and B. Uma. 2019. Intrusion detection using dimensionality reduced soft matrix. In Proceedings of the 5th International Conference on Engineering and MIS. ACM, Astana Kazakhstan, 1–7. https://doi.org/10.1145/3330431.3330465
[37]
Arun Nagaraja, B. Uma, and Rajesh kumar Gunupudi. 2020. UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation. Foundations of Science 25, 4 (Dec. 2020), 1049–1075. https://doi.org/10.1007/s10699-019-09589-5
[38]
PhridviRaj, Chintakindi Srinivas, and C.V. GuruRao. 2014. Clustering Text Data Streams – A Tree based Approach with Ternary Function and Ternary Feature Vector. Procedia Computer Science 31 (2014), 976–984. https://doi.org/10.1016/j.procs.2014.05.350 2nd International Conference on Information Technology and Quantitative Management, ITQM 2014.
[39]
M.S.B. Phridviraj, Vangipuram RadhaKrishna, Chintakindi Srinivas, and C.V. GuruRao. 2015. A Novel Gaussian Based Similarity Measure for Clustering Customer Transactions Using Transaction Sequence Vector. Procedia Technology 19(2015), 880–887. https://doi.org/10.1016/j.protcy.2015.02.126 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, 9-10 October 2014, Tirgu Mures, Romania.
[40]
M.S.B. Phridviraj, V. Radhakrishna, K. Vinay Kumar, and C.V. GuruRao. 2015. A novel similarity measure for clustering customer transactions using ternary sequence vector. Advances in Intelligent Systems and Computing 347 (2015), 297–308. https://doi.org/10.1007/978-3-319-18476-0_30 Conference of 4th Computer Science On-line Conference, CSOC 2015 ; Conference Date: 27 April 2015 Through 30 April 2015; Conference Code:135449.
[41]
M. S. B. PhridviRaj and C. V. Guru Rao. 2015. An Approach for Clustering Text Data Streams Using K-Means and Ternary Feature Vector Based Similarity Measure. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 68, 6 pages. https://doi.org/10.1145/2832987.2833081
[42]
M. S. B. Phridviraj and C. V. Guru Rao. 2019. A Novel Approach for Unsupervised Learning of Transaction Data. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 32, 5 pages. https://doi.org/10.1145/3330431.3330464
[43]
Malik Qasaimeh, Raad S. Al-Qassas, Fida Mohammad, and Shadi Aljawarneh. 2020. A Novel Simplified AES Algorithm for Lightweight Real-Time Applications: Testing and Discussion. Recent Advances in Computer Science and Communications 13, 3 (Aug. 2020), 435–445. https://doi.org/10.2174/2213275912666181214152207
[44]
V. RadhaKrishna. 2015. Design and analysis of novel kernel measure for software fault localization. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833042 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.
[45]
V. Radhakrishna, S. Aljawarneh, and A. Cheruvu. 2018. Sequential approach for mining of temporal itemsets. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234731 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.
[46]
V. Radhakrishna, S.A. Aljawarneh, V. Janaki, and P.V. Kumar. 2018. Looking into the possibility for designing normal distribution based dissimilarity measure to discover time profiled association patterns. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–5. https://doi.org/10.1109/ICEMIS.2017.8273097 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.
[47]
V. Radhakrishna, S. Aljawarneh, P.V. Kumar, and A. Cheruvu. 2018. Kaala VRKSHA - Extending VRKSHA for time profiled temporal association mining. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3279996.3280026 Conference of 1st International Conference on Data Science, E-Learning and Information Systems, DATA 2018 ; Conference Date: 1 October 2018 Through 2 October 2018; Conference Code:142393.
[48]
V. Radhakrishna, S.A. Aljawarneh, P.V. Kumar, and K.-K.R. Choo. 2018. A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Computing 22, 6 (2018), 1903–1919. https://doi.org/10.1007/s00500-016-2445-y
[49]
V. Radhakrishna, S.A. Aljawarneh, P.V. Kumar, and V. Janaki. 2018. A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining. Future Generation Computer Systems 83 (2018), 582–595. https://doi.org/10.1016/j.future.2017.03.016
[50]
V. Radhakrishna, S. Aljawarneh, P.V. Kumar, V. Janaki, and A. Cheruvu. 2019. Discovery of time profiled temporal patterns. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330459 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.
[51]
V. Radhakrishna, S.A. Aljawarneh, P. Veereswara Kumar, and V. Janaki. 2019. ASTRA - A Novel interest measure for unearthing latent temporal associations and trends through extending basic gaussian membership function. Multimedia Tools and Applications 78, 4 (2019), 4217–4265. https://doi.org/10.1007/s11042-017-5280-y
[52]
V. Radhakrishna, V. Janaki, S. Aljawarneh, P.V. Kumar, and A. Cheruvu. 2019. Tree based data fusion approach for mining temporal patterns. ACM International Conference Proceeding Series (2019). https://doi.org/10.1145/3330431.3330463 Conference of 5th International Conference on Engineering and MIS, ICEMIS 2019 ; Conference Date: 6 June 2019 Through 8 June 2019; Conference Code:149162.
[53]
V. Radhakrishna, P.V. Kumar, S.A. Aljawarneh, and V. Janaki. 2018. Design and analysis of a novel temporal dissimilarity measure using Gaussian membership function. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 2018-January(2018), 1–5. https://doi.org/10.1109/ICEMIS.2017.8273098 Conference of 2017 International Conference on Engineering and MIS, ICEMIS 2017 ; Conference Date: 8 May 2017 Through 10 May 2017; Conference Code:134460.
[54]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2015. An approach for mining similarity profiled temporal association patterns using Gaussian based dissimilarity measure. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833069 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.
[55]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2015. A temporal pattern mining based approach for intrusion detection using similarity measure. ACM International Conference Proceeding Series 24-26-September-2015 (2015). https://doi.org/10.1145/2832987.2833077 Conference of 2015 International Conference on Engineering and MIS, ICEMIS 2015 ; Conference Date: 24 September 2015 Through 26 September 2015; Conference Code:119163.
[56]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. An approach for mining similar temporal association patterns in single database scan. Smart Innovation, Systems and Technologies 51 (2016), 607–617. https://doi.org/10.1007/978-3-319-30927-9_60 Conference of 1st International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2015 ; Conference Date: 28 November 2015 Through 29 November 2015; Conference Code:174689.
[57]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A computationally optimal approach for extracting similar temporal patterns. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745344 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.
[58]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Looking into the possibility of novel dissimilarity measure to discover similarity profiled temporal association patterns in IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745353 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.
[59]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Mining of outlier temporal patterns. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745343 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.
[60]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. Mining outlier temporal association patterns. ACM International Conference Proceeding Series 04-05-March-2016 (2016). https://doi.org/10.1145/2905055.2905320 Conference of 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016 ; Conference Date: 4 March 2016 Through 5 March 2016; Conference Code:123477.
[61]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A novel approach to discover similar temporal association patterns in a single database scan, Krishnan N. Karthikeyan M. (Ed.). 2015 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015(2016). https://doi.org/10.1109/ICCIC.2015.7435809 Conference of 6th IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015 ; Conference Date: 10 December 2015 Through 12 December 2015; Conference Code:120030.
[62]
V. Radhakrishna, P. Kumar, and V. Janaki. 2016. A novel similar temporal system call pattern mining for efficient intrusion detection. Journal of Universal Computer Science 22, 4 (2016), 475–493. https://www.scopus.com/inward/record.uri?eid=2-s2.0-84978414602&partnerID=40&md5=6bfa14df22045e36f5bf23e839dca48b
[63]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2016. A single database scan approach for mining temporally similar association patterns. ACM International Conference Proceeding Series 04-05-March-2016 (2016). https://doi.org/10.1145/2905055.2905287 Conference of 2nd International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016 ; Conference Date: 4 March 2016 Through 5 March 2016; Conference Code:123477.
[64]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2017. A computationally efficient approach for mining similar temporal patterns. Advances in Intelligent Systems and Computing 576 (2017), 197–208. https://doi.org/10.1007/978-3-319-58088-3_19 Conference of 22nd International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Swarm Intelligence, Fuzzy Logic, Neural Networks, Chaos, Bayesian Methods, Intelligent Image Processing, Bio-Inspired Robotics, MENDEL 2016 ; Conference Date: 8 June 2016 Through 10 June 2016; Conference Code:192169.
[65]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2018. Krishna sudarsana – A Z-space similarity measure. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234742 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.
[66]
V. Radhakrishna, P.V. Kumar, and V. Janaki. 2019. GANDIVA: Temporal pattern tree for similarity profiled association mining. International Journal of Information Technology and Web Engineering 14, 4(2019), 1–18. https://doi.org/10.4018/IJITWE.2019100101
[67]
V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2016. A computationally efficient approach for temporal pattern mining in IoT. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745354 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.
[68]
V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2016. A similarity measure for outlier detection in timestamped temporal databases. Proceedings - 2016 International Conference on Engineering and MIS, ICEMIS 2016 (2016). https://doi.org/10.1109/ICEMIS.2016.7745347 Conference of 2016 International Conference on Engineering and MIS, ICEMIS 2016 ; Conference Date: 22 September 2016 Through 24 September 2016; Conference Code:124851.
[69]
V. Radhakrishna, P.V. Kumar, V. Janaki, and S. Aljawarneh. 2018. GANDIVA - Time profiled temporal pattern tree. ACM International Conference Proceeding Series (2018). https://doi.org/10.1145/3234698.3234734 Conference of 4th International Conference on Engineering and MIS, ICEMIS 2018 ; Conference Date: 19 June 2018 Through 20 June 2018; Conference Code:138526.
[70]
V. Radhakrishna, P.V. Kumar, V. Janaki, and N. Rajasekhar. 2017. Estimating prevalence bounds of temporal association patterns to discover temporally similar patterns. Advances in Intelligent Systems and Computing 576 (2017), 209–220. https://doi.org/10.1007/978-3-319-58088-3_20 Conference of 22nd International Conference on Soft Computing: Evolutionary Computation, Genetic Programming, Swarm Intelligence, Fuzzy Logic, Neural Networks, Chaos, Bayesian Methods, Intelligent Image Processing, Bio-Inspired Robotics, MENDEL 2016 ; Conference Date: 8 June 2016 Through 10 June 2016; Conference Code:192169.
[71]
V. Radhakrishna, P. V. Kumar, and V. Janaki. 2015. A Temporal Pattern Mining Based Approach for Intrusion Detection Using Similarity Measure. In Proceedings of the The International Conference on Engineering & MIS 2015 - ICEMIS ’15. ACM Press, Istanbul, Turkey, 1–8. https://doi.org/10.1145/2832987.2833077
[72]
Vangipuram Radhakrishna, Gali Suresh Reddy, Puligadda Veereswara Kumar, and Vinjamuri Janaki. 2021. Challenge Paper: The Vision for Time Profiled Temporal Association Mining. Journal of Data and Information Quality 13, 2 (May 2021), 1–8. https://doi.org/10.1145/3404198
[73]
Vangipuram Radhakrishna, Chintakindi Srinivas, and C. V. GuruRao. 2014. A Modified Gaussian Similarity Measure for Clustering Software Components and Documents. In Proceedings of the International Conference on Information Systems and Design of Communication (Lisbon, Portugal) (ISDOC ’14). Association for Computing Machinery, New York, NY, USA, 99–104. https://doi.org/10.1145/2618168.2618184
[74]
V. Radhakrishna, P. Veereswara Kumar, and V. Janaki. 2018. SRIHASS - a similarity measure for discovery of hidden time profiled temporal associations. Multimedia Tools and Applications 77, 14 (2018), 17643–17692. https://doi.org/10.1007/s11042-017-5185-9
[75]
Julio C. S. Reis, Andre Correia, Fabricio Murai, Adriano Veloso, Fabricio Benevenuto, and Erik Cambria. 2019. Supervised Learning for Fake News Detection. IEEE Intelligent Systems 34, 2 (March 2019), 76–81. https://doi.org/10.1109/MIS.2019.2899143
[76]
Victoria L. Rubin, Yimin Chen, and Nadia K. Conroy. 2015. Deception detection for news: Three types of fakes. Proceedings of the Association for Information Science and Technology 52, 1 (Jan. 2015), 1–4. https://doi.org/10.1002/pra2.2015.145052010083
[77]
Peining Shi, Zhiyong Zhang, and Kim-Kwang Raymond Choo. 2019. Detecting Malicious Social Bots Based on Clickstream Sequences. IEEE Access 7(2019), 28855–28862. https://doi.org/10.1109/ACCESS.2019.2901864
[78]
Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2013. Clustering Software Components for Program Restructuring and Component Reuse Using Hybrid XOR Similarity Function. AASRI Procedia 4(2013), 319–328. https://doi.org/10.1016/j.aasri.2013.10.047 2013 AASRI Conference on Intelligent Systems and Control.
[79]
Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2014. Clustering and Classification of Software Component for Efficient Component Retrieval and Building Component Reuse Libraries. Procedia Computer Science 31 (2014), 1044–1050. https://doi.org/10.1016/j.procs.2014.05.358 2nd International Conference on Information Technology and Quantitative Management, ITQM 2014.
[80]
Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2014. Clustering Software Components for Program Restructuring and Component Reuse Using Hybrid XNOR Similarity Function. Procedia Technology 12(2014), 246–254. https://doi.org/10.1016/j.protcy.2013.12.482 The 7th International Conference Interdisciplinarity in Engineering, INTER-ENG 2013, 10-11 October 2013, Petru Maior University of Tirgu Mures, Romania.
[81]
Chintakindi Srinivas, Vangipuram Radhakrishna, and C.V. Guru Rao. 2015. Software Component Clustering and Classification Using Novel Similarity Measure. Procedia Technology 19(2015), 866–873. https://doi.org/10.1016/j.protcy.2015.02.124 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, 9-10 October 2014, Tirgu Mures, Romania.
[82]
Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2013. Clustering Software Components for Component Reuse and Program Restructuring. In Proceedings of the Second International Conference on Innovative Computing and Cloud Computing(Wuhan, China) (ICCC ’13). Association for Computing Machinery, New York, NY, USA, 261–266. https://doi.org/10.1145/2556871.2556933
[83]
Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2013. Clustering Software Components for Component Reuse and Program Restructuring. In Proceedings of the Second International Conference on Innovative Computing and Cloud Computing(Wuhan, China) (ICCC ’13). Association for Computing Machinery, New York, NY, USA, 261–266. https://doi.org/10.1145/2556871.2556933
[84]
Chintakindi Srinivas, Vangipuram Radhakrishna, and C. V. Guru Rao. 2015. Clustering Software Project Components for Strategic Decisions and Building Reuse Libraries. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 62, 5 pages. https://doi.org/10.1145/2832987.2833075
[85]
Chintakindi Srinivas and C. V. Guru Rao. 2015. A Feature Vector Based Approach for Software Component Clustering and Reuse Using K-Means. In Proceedings of the The International Conference on Engineering and MIS 2015 (Istanbul, Turkey) (ICEMIS ’15). Association for Computing Machinery, New York, NY, USA, Article 67, 5 pages. https://doi.org/10.1145/2832987.2833080
[86]
Chintakindi Srinivas and C. V. Guru Rao. 2019. A Novel Approach for Unsupervised Learning of Software Components. In Proceedings of the 5th International Conference on Engineering and MIS (Astana, Kazakhstan) (ICEMIS ’19). Association for Computing Machinery, New York, NY, USA, Article 29, 6 pages. https://doi.org/10.1145/3330431.3330461
[87]
Kelly Stahl. 2018. Fake news detection in social media. https://www.semanticscholar.org/paper/Fake-news-detection-in-social-media-Stahl/b202b4b7124b774391109dc47a33e17224b12295
[88]
R. Vangipuram, R.K. Gunupudi, V.K. Puligadda, and J. Vinjamuri. 2020. A machine learning approach for imputation and anomaly detection in IoT environment. Expert Systems 37, 5 (2020). https://doi.org/10.1111/exsy.12556
[89]
R. Vangipuram, P.V. Kumar, V. Janaki, S.A. Aljawarneh, J.A. Lara, and K. Khatatneh. 2020. Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns. Foundations of Science 25, 4 (2020), 1027–1048. https://doi.org/10.1007/s10699-019-09590-y
[90]
Vinjamuri Janaki Vangipuram Radhakrishna, Puligadda Veereswara Kumar. 2016. (V. Radhakrishna, P. Kumar, V. Janaki) A Novel Similar Temporal System Call Pattern Mining for EfficientIntrusion Detection. http://www.jucs.org/jucs_22_4/a_novel_similar_temporal
[91]
Kuai Xu, Feng Wang, Haiyan Wang, and Bo Yang. 2020. Detecting fake news over online social media via domain reputations and content understanding. Tsinghua Science and Technology 25, 1 (Feb. 2020), 20–27. https://doi.org/10.26599/TST.2018.9010139
[92]
Muneer Bani Yassien, Shadi A. Aljawarneh, Mohammad Eyadat, and Eman Eaydat. 2021. Routing protocol for low power and lossy network–load balancing time-based. International Journal of Machine Learning and Cybernetics (Jan. 2021). https://doi.org/10.1007/s13042-020-01261-w
[93]
Xinyi Zhou and Reza Zafarani. 2020. A Survey of Fake News: Fundamental Theories, Detection Methods, and Opportunities. Comput. Surveys 53, 5 (Oct. 2020), 1–40. https://doi.org/10.1145/3395046

Cited By

View all
  • (2024)Fake News Detection with Machine Learning AlgorithmsCelal Bayar Üniversitesi Fen Bilimleri Dergisi10.18466/cbayarfbe.147257620:3(65-83)Online publication date: 30-Sep-2024
  • (2024)Unraveling Deception: Pioneering Machine Learning Solutions for Authenticating News in Evolving Social Media Landscapes2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS)10.1109/ICITEICS61368.2024.10625510(1-6)Online publication date: 28-Jun-2024
  • (2024)Enhancing Information Integrity: Machine Learning Methods for Fake News DetectionFourth Congress on Intelligent Systems10.1007/978-981-99-9037-5_19(247-257)Online publication date: 18-Mar-2024
  • Show More Cited By

Index Terms

  1. Fake News Detection Using Machine Learning Methods
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        DATA'21: International Conference on Data Science, E-learning and Information Systems 2021
        April 2021
        277 pages
        ISBN:9781450388382
        DOI:10.1145/3460620
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 04 June 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Fake news
        2. Machine Learning
        3. Naïve Bayes
        4. SVM
        5. performance

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        DATA'21

        Acceptance Rates

        Overall Acceptance Rate 74 of 167 submissions, 44%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)108
        • Downloads (Last 6 weeks)2
        Reflects downloads up to 12 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Fake News Detection with Machine Learning AlgorithmsCelal Bayar Üniversitesi Fen Bilimleri Dergisi10.18466/cbayarfbe.147257620:3(65-83)Online publication date: 30-Sep-2024
        • (2024)Unraveling Deception: Pioneering Machine Learning Solutions for Authenticating News in Evolving Social Media Landscapes2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS)10.1109/ICITEICS61368.2024.10625510(1-6)Online publication date: 28-Jun-2024
        • (2024)Enhancing Information Integrity: Machine Learning Methods for Fake News DetectionFourth Congress on Intelligent Systems10.1007/978-981-99-9037-5_19(247-257)Online publication date: 18-Mar-2024
        • (2023)Fake news detection using machine learning: an adversarial collaboration approachInternet Research10.1108/INTR-03-2022-0176Online publication date: 11-Oct-2023
        • (2023)Applications of Bayesian Neural Networks in Outlier DetectionBig Data10.1089/big.2021.034311:5(369-386)Online publication date: 1-Oct-2023
        • (2023)Fake News Detection Using Supervised Machine Learning Classification AlgorithmsInventive Computation and Information Technologies10.1007/978-981-19-7402-1_65(919-933)Online publication date: 2-Mar-2023
        • (2022)Exploring the Effect of N-grams with BOW and TF-IDF Representations on Detecting Fake News2022 International Conference on Data Analytics for Business and Industry (ICDABI)10.1109/ICDABI56818.2022.10041537(741-746)Online publication date: 25-Oct-2022
        • (2022)A Survey on Fake News Detection Using Machine Learning2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)10.1109/ICAC3N56670.2022.10074450(327-331)Online publication date: 16-Dec-2022
        • (2021)Machine Learning Techniques for the Classification of Fake News2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)10.1109/ICCICA52458.2021.9697267(1-5)Online publication date: 26-Nov-2021

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media