{"id":"https://openalex.org/W4407613864","doi":"https://doi.org/10.1007/978-981-96-1525-4_1","title":"Fake News Detection Across Multiple Domains Using Fuzzy Association Rules","display_name":"Fake News Detection Across Multiple Domains Using Fuzzy Association Rules","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407613864","doi":"https://doi.org/10.1007/978-981-96-1525-4_1"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-96-1525-4_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-96-1525-4_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100532681","display_name":"Xiaofeng Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaofeng Xu","raw_affiliation_strings":["Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, 610225, China","SUGON Industrial Control and Security Center, Chengdu, 610225, China","School of Cybersecurity, Xin Gu Industrial College, Chengdu University of Information Technology, Chengdu, 610225, China"],"affiliations":[{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, 610225, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"SUGON Industrial Control and Security Center, Chengdu, 610225, China","institution_ids":[]},{"raw_affiliation_string":"School of Cybersecurity, Xin Gu Industrial College, Chengdu University of Information Technology, Chengdu, 610225, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I4210125143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069733972","display_name":"Weisha Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weisha Zhang","raw_affiliation_strings":["School of Foreign Languages, University of Electronic Science and Technology of China, Chengdu, 611731, China"],"affiliations":[{"raw_affiliation_string":"School of Foreign Languages, University of Electronic Science and Technology of China, Chengdu, 611731, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047073937","display_name":"Yuanyuan Huang","orcid":"https://orcid.org/0000-0003-0404-1988"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan Huang","raw_affiliation_strings":["Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, 610225, China","SUGON Industrial Control and Security Center, Chengdu, 610225, China","School of Cybersecurity, Xin Gu Industrial College, Chengdu University of Information Technology, Chengdu, 610225, China"],"affiliations":[{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, 610225, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"SUGON Industrial Control and Security Center, Chengdu, 610225, China","institution_ids":[]},{"raw_affiliation_string":"School of Cybersecurity, Xin Gu Industrial College, Chengdu University of Information Technology, Chengdu, 610225, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I4210125143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102224082","display_name":"Hongyu Lu","orcid":"https://orcid.org/0009-0006-9887-0929"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]},{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyu Lu","raw_affiliation_strings":["Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, 610225, China","SUGON Industrial Control and Security Center, Chengdu, 610225, China","School of Cybersecurity, Xin Gu Industrial College, Chengdu University of Information Technology, Chengdu, 610225, China"],"affiliations":[{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, 610225, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"SUGON Industrial Control and Security Center, Chengdu, 610225, China","institution_ids":[]},{"raw_affiliation_string":"School of Cybersecurity, Xin Gu Industrial College, Chengdu University of Information Technology, Chengdu, 610225, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I4210125143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050355537","display_name":"Jiazhong Lu","orcid":"https://orcid.org/0000-0002-8982-8255"},"institutions":[{"id":"https://openalex.org/I4210125143","display_name":"Chengdu University","ror":"https://ror.org/034z67559","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125143"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiazhong Lu","raw_affiliation_strings":["Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, 610225, China","SUGON Industrial Control and Security Center, Chengdu, 610225, China","School of Cybersecurity, Xin Gu Industrial College, Chengdu University of Information Technology, Chengdu, 610225, China"],"affiliations":[{"raw_affiliation_string":"Advanced Cryptography and System Security Key Laboratory of Sichuan Province, Chengdu, 610225, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"SUGON Industrial Control and Security Center, Chengdu, 610225, China","institution_ids":[]},{"raw_affiliation_string":"School of Cybersecurity, Xin Gu Industrial College, Chengdu University of Information Technology, Chengdu, 610225, China","institution_ids":["https://openalex.org/I24201400","https://openalex.org/I4210125143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100532681"],"corresponding_institution_ids":["https://openalex.org/I24201400","https://openalex.org/I4210125143","https://openalex.org/I4210132990"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07611239,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":1.0,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8447815179824829},{"id":"https://openalex.org/keywords/association-rule-learning","display_name":"Association rule learning","score":0.7062646150588989},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6063101887702942},{"id":"https://openalex.org/keywords/association","display_name":"Association (psychology)","score":0.5666839480400085},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44670188426971436},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41764605045318604}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8447815179824829},{"id":"https://openalex.org/C193524817","wikidata":"https://www.wikidata.org/wiki/Q386780","display_name":"Association rule learning","level":2,"score":0.7062646150588989},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6063101887702942},{"id":"https://openalex.org/C142853389","wikidata":"https://www.wikidata.org/wiki/Q744778","display_name":"Association (psychology)","level":2,"score":0.5666839480400085},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44670188426971436},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41764605045318604},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-96-1525-4_1","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-96-1525-4_1","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1832693441","https://openalex.org/W2510804350","https://openalex.org/W2577716227","https://openalex.org/W2577888896","https://openalex.org/W2809290718","https://openalex.org/W2809476703","https://openalex.org/W2894544906","https://openalex.org/W2897757923","https://openalex.org/W2906971970","https://openalex.org/W2969302795","https://openalex.org/W2998395006","https://openalex.org/W3003961771","https://openalex.org/W3041133507","https://openalex.org/W3080189354","https://openalex.org/W3107058614","https://openalex.org/W3113432628","https://openalex.org/W3133378905","https://openalex.org/W3170073102","https://openalex.org/W3191654415","https://openalex.org/W3210022786","https://openalex.org/W3212136961","https://openalex.org/W4280532493","https://openalex.org/W4289108963","https://openalex.org/W4307900381","https://openalex.org/W4312585885","https://openalex.org/W4362588058","https://openalex.org/W4382239831","https://openalex.org/W6850569871"],"related_works":["https://openalex.org/W2392697706","https://openalex.org/W366033468","https://openalex.org/W128746893","https://openalex.org/W2367573304","https://openalex.org/W2537030075","https://openalex.org/W2006971496","https://openalex.org/W2065998343","https://openalex.org/W2369717039","https://openalex.org/W2384676159","https://openalex.org/W2982449560"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
