{"id":"https://openalex.org/W4402256308","doi":"https://doi.org/10.1145/3673199.3673202","title":"Computational Methods to Counter Online Misinformation","display_name":"Computational Methods to Counter Online Misinformation","publication_year":2023,"publication_date":"2023-07-10","ids":{"openalex":"https://openalex.org/W4402256308","doi":"https://doi.org/10.1145/3673199.3673202"},"language":"en","primary_location":{"id":"doi:10.1145/3673199.3673202","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3673199.3673202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"4th ACM Europe Summer School on Science: Towards building the Data Science Stack","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011336242","display_name":"Paolo Papotti","orcid":"https://orcid.org/0000-0003-0651-4128"},"institutions":[{"id":"https://openalex.org/I1902872","display_name":"EURECOM","ror":"https://ror.org/00sse7z02","country_code":"FR","type":"education","lineage":["https://openalex.org/I1902872","https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Paolo Papotti","raw_affiliation_strings":["Data Science Department, EURECOM, Campus SophiaTech, Biot, France"],"affiliations":[{"raw_affiliation_string":"Data Science Department, EURECOM, Campus SophiaTech, Biot, France","institution_ids":["https://openalex.org/I1902872"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5011336242"],"corresponding_institution_ids":["https://openalex.org/I1902872"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.40837477,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9006999731063843,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9006999731063843,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/misinformation","display_name":"Misinformation","score":0.8595160245895386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7016825675964355},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3343952000141144},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2637752890586853}],"concepts":[{"id":"https://openalex.org/C2776990098","wikidata":"https://www.wikidata.org/wiki/Q13579947","display_name":"Misinformation","level":2,"score":0.8595160245895386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7016825675964355},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3343952000141144},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2637752890586853}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3673199.3673202","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3673199.3673202","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"4th ACM Europe Summer School on Science: Towards building the Data Science Stack","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.47999998927116394,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W3197131596","https://openalex.org/W4390616380","https://openalex.org/W4388666321","https://openalex.org/W4205914924","https://openalex.org/W4283459170","https://openalex.org/W4220949352","https://openalex.org/W4225301003","https://openalex.org/W4229014887"],"abstract_inverted_index":{"Misinformation":[0],"is":[1,16,145,200],"an":[2],"important":[3],"problem":[4],"but":[5],"mitigators":[6],"are":[7,30,159],"overwhelmed":[8],"by":[9],"the":[10,38,45,49,54,72,81,97,125,194,197,206,215],"amount":[11],"of":[12,40,48,65,175,193,209,219],"false":[13],"content":[14,42],"that":[15,34,93,110,169],"produced":[17],"online":[18],"every":[19],"day.":[20],"To":[21],"assist":[22],"human":[23],"experts":[24],"in":[25,128,149,178,181,225],"their":[26,223],"efforts,":[27],"several":[28],"projects":[29],"proposing":[31],"computational":[32,86,161,220],"methods":[33,92,171,221],"aim":[35],"at":[36],"supporting":[37],"detection":[39],"malicious":[41],"online.":[43],"In":[44,71,205],"first":[46],"part":[47,208],"lecture,":[50,211],"we":[51,75,212],"will":[52,76,90,121,213],"overview":[53],"different":[55],"approaches,":[56],"spanning":[57],"from":[58,96,202],"solutions":[59,95],"involving":[60],"humans":[61],"and":[62,99,131,141,156,180,217,222],"a":[63,146],"crowd":[64],"users":[66],"to":[67,102,138,154,190],"fully":[68],"automated":[69],"approaches.":[70],"second":[73],"part,":[74],"focus":[77],"our":[78],"attention":[79],"on":[80,117],"data":[82,104,155],"driven":[83,105],"verification":[84,170],"for":[85],"fact":[87,162,187],"checking.":[88],"We":[89,120],"review":[91],"combine":[94],"ML":[98],"NLP":[100],"literature":[101],"build":[103],"verification,":[106],"such":[107],"as":[108],"those":[109],"translate":[111],"text":[112],"claims":[113,140],"into":[114],"SQL":[115],"queries":[116],"relational":[118],"databases.":[119],"also":[122],"cover":[123,214],"how":[124],"rich":[126],"semantics":[127],"knowledge":[129],"graphs":[130],"pre-trained":[132],"language":[133],"models":[134],"can":[135],"be":[136],"used":[137],"verify":[139],"produce":[142],"explanations,":[143],"which":[144],"key":[147],"requirement":[148],"this":[150,210],"space.":[151],"Better":[152],"access":[153],"new":[157],"algorithms":[158],"pushing":[160],"checking":[163],"forward,":[164],"with":[165],"experimental":[166],"results":[167],"showing":[168],"enable":[172],"effective":[173],"labeling":[174],"claims,":[176],"both":[177],"simulations":[179],"real":[182],"world":[183],"efforts.":[184],"However,":[185],"while":[186],"checkers":[188],"start":[189],"adopt":[191],"some":[192],"resulting":[195],"tools,":[196],"misinformation":[198],"fight":[199],"far":[201],"being":[203],"won.":[204],"last":[207],"opportunities":[216],"limitations":[218],"role":[224],"fighting":[226],"misinformation.":[227]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
