{"id":"https://openalex.org/W4400947571","doi":"https://doi.org/10.1145/3672919.3672937","title":"Multi-Domain Fake News Detection Based on Serial Attention Networks","display_name":"Multi-Domain Fake News Detection Based on Serial Attention Networks","publication_year":2024,"publication_date":"2024-03-01","ids":{"openalex":"https://openalex.org/W4400947571","doi":"https://doi.org/10.1145/3672919.3672937"},"language":"en","primary_location":{"id":"doi:10.1145/3672919.3672937","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672919.3672937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111267326","display_name":"Chongfeng Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chongfeng Qiu","raw_affiliation_strings":["School of Cyberspace Security, Chengdu University of Information Technology, China"],"raw_orcid":"https://orcid.org/0009-0005-4053-3949","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Chengdu University of Information Technology, China","institution_ids":["https://openalex.org/I24201400"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5111267326"],"corresponding_institution_ids":["https://openalex.org/I24201400"],"apc_list":null,"apc_paid":null,"fwci":1.0744,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81535024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"91","last_page":"96"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9713000059127808,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13083","display_name":"Advanced Text Analysis Techniques","score":0.9491999745368958,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7606263160705566},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.6313972473144531}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7606263160705566},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.6313972473144531},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3672919.3672937","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672919.3672937","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2750779823","https://openalex.org/W2798787718","https://openalex.org/W2906971970","https://openalex.org/W3034552520","https://openalex.org/W3097482582","https://openalex.org/W3133378905","https://openalex.org/W3168667219","https://openalex.org/W3210022786","https://openalex.org/W4220939111","https://openalex.org/W4281688135","https://openalex.org/W4283712118","https://openalex.org/W4379875113","https://openalex.org/W6601016832","https://openalex.org/W6602552413"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"With":[0],"the":[1,10,38,50,82,99,123,128,142,148,154,171,176,189],"rise":[2],"of":[3,15,25,40,84,94,102,117,130,193],"social":[4],"media":[5],"and":[6,13,34,108,115,164,191],"online":[7],"news":[8,17,27,43,59,75,86,118,134,185,203],"platforms,":[9],"accurate":[11],"identification":[12],"detection":[14,44,60,166,186],"fake":[16,26,42,58,85,184,202],"has":[18,36],"become":[19],"a":[20,46,55,65,92,137],"global":[21],"issue.":[22],"The":[23,88],"proliferation":[24],"in":[28,49,77,133,182,200],"various":[29],"fields,":[30],"such":[31],"as":[32],"politics":[33],"health,":[35],"made":[37],"exploration":[39],"multi-domain":[41,57,183,201],"methods":[45],"hot":[47],"topic":[48],"field.":[51],"This":[52],"paper":[53],"introduces":[54],"novel":[56],"model,":[61],"ATTFEND,":[62],"which":[63],"incorporates":[64,157],"serial":[66,194],"attention":[67,95,195],"network":[68,125,144],"to":[69,97,111,160],"efficiently":[70],"extract":[71],"high-quality":[72,131],"features":[73,132],"from":[74],"samples":[76,135],"different":[78],"domains,":[79],"thereby":[80],"improving":[81],"accuracy":[83],"detection.":[87,204],"ATTFEND":[89,155,177],"model":[90,156,162,178],"uses":[91],"series":[93],"networks":[96,110,196],"capture":[98,129],"feature":[100,150],"representation":[101],"news,":[103],"passing":[104],"through":[105,136],"Eca-Attention,":[106],"Double-Eca-Attention,":[107],"Mask-Attention":[109,143],"achieve":[112],"deep":[113],"extraction":[114],"enhancement":[116],"sample":[119],"features.":[120],"In":[121,152],"particular,":[122],"Double-Eca-Attention":[124],"further":[126],"enhances":[127],"two-layer":[138],"convolution":[139],"operation,":[140],"while":[141],"focuses":[145],"on":[146,170],"optimizing":[147],"sentence-level":[149],"representation.":[151],"addition,":[153],"BatchNorm2d":[158],"normalization":[159,199],"accelerate":[161],"convergence":[163],"improve":[165],"performance.":[167],"Experimental":[168],"results":[169],"Weibo21":[172],"dataset":[173],"show":[174],"that":[175],"outperforms":[179],"existing":[180],"technologies":[181],"tasks,":[187],"validating":[188],"effectiveness":[190],"superiority":[192],"combined":[197],"with":[198]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
