<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>CIC at CheckThat! 2021: Fake News detection Using Machine Learning And Data Augmentation</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Noman Ashraf</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sabur Butt</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Grigori Sidorov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexander Gelbukh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>(CIC, Instituto Politécnico Nacional</institution>
          ,
          <country country="MX">Mexico)</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Disinformation in the form of fake news, phoney press releases and hoaxes may be misleading, especially when they are not from their original sources and this fake news can cause significant harm to the people. In this paper, we report several machine learning classifiers on the CLEF2021 dataset for the tasks of news claim and topic classification using -grams. We achieve an F1 score of 38.92% on news claim classification (task 3a) and an F 1 score of 78.96% on topic classification (task 3b). In addition, we augmented the dataset for news claim classification and we observed that insertion of alternative words was not beneficial for the fake news classification task.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;fake news detection</kwd>
        <kwd>fake news data augmentation</kwd>
        <kwd>fake news topic classification</kwd>
        <kwd>fake news claim classification</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Increase in social media outlets has impacted many natural language problems such as emotion
detection [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ], human behavior detection [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] question answering [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], threat detection [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
sexism detection [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], depression detection [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] etc. Easy and accessible dissemination of news
in social media has resulted in a dire need for fake news identification and checks online. To
ensure the credibility of news spreaders on social media, the research community needs to
play its part in developing automatic methods of identification of false claims, disinformation
and misinformation. Automatic detection of fake news aims to mitigate the time and human
resources spent on identifying fake news and spreaders from the stream of continuously created
data.
      </p>
      <p>
        To tackle this problem, natural language processing (NLP) researchers have made many
sophisticated attempts by creating specific tasks for detecting rumor [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ], fact checking [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ],
deception [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ], article stance [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">14, 15, 16</xref>
        ], satire [
        <xref ref-type="bibr" rid="ref17 ref18">17, 18</xref>
        ], check worthiness [
        <xref ref-type="bibr" rid="ref10 ref19 ref20 ref21 ref22 ref23">10, 19, 20, 21,
22, 23</xref>
        ], cherry picking [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ], clickbait [
        <xref ref-type="bibr" rid="ref26 ref27 ref28">26, 27, 28</xref>
        ] and hyperpartisan [
        <xref ref-type="bibr" rid="ref29 ref30">29, 30</xref>
        ] in English
language. The tasks have been attempted using rules crafted by humans, machine learning (ML)
models [
        <xref ref-type="bibr" rid="ref31 ref32">31, 32</xref>
        ] and deep learning (DL) methods [
        <xref ref-type="bibr" rid="ref33 ref34 ref35">33, 34, 35</xref>
        ].
      </p>
      <p>In this paper, we have tackled two tasks of CLEF2021 fake news classification. The first task
required multi-class classification of articles to determine if the claim made in the article is
true, false, partially false or other (lack of evidence to conclude). The second task required
the classification of the topic of an article. The fake news article was required to be classified
into five or more categories like election, health, conspiracy theory etc. The paper discusses
the diference in results with various machine learning methods. We attempted to gauge the
potential of machine learning methods on the described task. Both of these tasks were attempted
and the results were presented in the competition.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        Faking a piece of news has been part of all eras of technology in the form of yellow journalism.
However, since the advent of social media, the impact of the harm has grown many folds. It has
hence been one of the most challenging problems for researchers to solve since the last decade as
it is very dificult to distinguish fake text from real text. Theoretical fake news studies [
        <xref ref-type="bibr" rid="ref12 ref36 ref37">12, 36, 37</xref>
        ]
has seen classification of fake news in the form of misinformation, disinformation, hysteria,
falsehood, propaganda, clickbait and conspiracy theories. We have seen advances in the field in
the recent decade that had a real-life impact.
      </p>
      <p>
        There are various methods to diferentiate fake news from real news such as bag-of-words
(BOW) [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ], -grams [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ], GloVe [40], term frequency—inverse document frequency
(TFIDF) [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ] and contextual embeddings. Methods like bag-of-words do not include context
and rely on word frequencies, albeit, researchers have also used semantic analyses [41] to
determine truthfulness in a topic. We have also seen a well deep syntax approach [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ] using
probability context free grammar (PCFG) parsing trees. This approach uses rewritten uses of
sentences to study diferences in syntax structures in real and fake news. Another linguistic
approach [
        <xref ref-type="bibr" rid="ref14 ref15 ref16">14, 15, 16</xref>
        ] is to consider the topic of the article and test its relevance with the content
of the article. This is done by using linguistic features such as the length of the headlines,
advertisements, text patterns, author attributes etc.
      </p>
      <p>
        Various machine-learning methods have been used as well for fake news detection: support
vector machine (SVM) [42], naïve bayes (NB) [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ], logistic regression (LR) [43], k-nearest
neighborhood (K-NN) [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ], random forest (RF) [44] and decision trees (DT) [44]. These methods
have displayed strength in classifying misinformation using various features. Since feature
engineering is time-consuming, various neural network approaches such as long short-term
memory (LSTM) with linguistic inquiry and word count (LIWC) features [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ], recurrent neural
networks (RNN) based models [
        <xref ref-type="bibr" rid="ref34">45, 46, 34</xref>
        ] for user engagement and convolutional neural network
(CNN) based model [
        <xref ref-type="bibr" rid="ref33">33, 47</xref>
        ] with local features were applied to detect fake news.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Dataset</title>
      <p>Dataset for task 3a consisted of 900 articles with four labels. The claim in the article is detected
and classified as true, false, partially false or others. The “others” class identifies articles that
cannot be proven as false, true or partially true. While the partially false articles are those that
have weak evidence of the claim. In addition to this, task 3b uses the subset of task 3a articles
but classifies the article in six categories namely education, health, crime, election, climate and
economy. Table 1 and 2 show us the sample of the dataset for task 3a and 3b, while Table 3
shows the distribution of the dataset in both tasks according to their respective classes. The
ellipsis in the text demonstrates the omission of the complete article in the Table 1 and 2.</p>
      <p>Text
Distracted driving causes more deaths in
Canada than impaired driving .It’s why
every province and territory has laws
against driving while operating a cell
phone. “Tell your passengers to stay of
their phones while you are driving...</p>
      <p>Her name is Taylor Zundel, and it sounds
like she and her husband live in or near
Salt Lake City. And she witnessed quite
the irregularity when they showed up for
early voting: Not just her husband, but at
least one other voter, were told when they
got there that records showed they had
already voted...</p>
      <p>Title
You Can Be Fined $1,500
If Your Passenger Is Using
A Mobile Phone, Starting
Next Week</p>
      <p>Rating
false
Instagram Testimony: Peo- true
ple Are Showing Up to Vote
and Being Told They
Already Voted</p>
    </sec>
    <sec id="sec-4">
      <title>4. Methodology</title>
      <p>We used several machine learning algorithms such as logistic regression, multilayer perceptron,
support vector machine and random forest. For RF and MLP classifiers, default parameters were
used for all the experiments. We assign class weight parameter to “balance” for SVM and LR. In
addition, “saga” kernel was used for LR. Stratified 5-fold validation is applied for the evaluation
of the results. While accuracy, precision, recall and F1 are given for a thorough understanding
of the results, the competition ranked the teams using F1-macro. In NLP and opinion mining
tasks [48] these classifiers performed best. We also considered the limitations of the task
including an imbalanced dataset, especially for task 3a. The article contains grammatical errors,
spelling errors and repetition of keywords. Repetition of keywords for fake news negatively
influence the results of term frequency.</p>
      <sec id="sec-4-1">
        <title>4.1. Pre-Processing</title>
        <p>All pre-processing tasks were attempted using Ekphrasis [49] library. The normalization process
included removing “url”, “email” , “percent”, “money”, “phone”, “user”, “time”, “date”, and
“number” instances from the text. The contraction was also unpacked for better context i.e.
hasn’t changed into has not. Since we often encounter elongated words in informal news
articles, the elongated words were spell corrected to their base words.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Augmented Dataset</title>
        <p>The data was augmented using word2vec embeddings adding a substitute of sentences. We used
nlpaug library [50] in python, setting action type as insert and type as word2vec. Augmentation
was done by inserting or replacing words in a sentence randomly leveraged by word2vec
similarity search. For example, the sentence “The quick brown fox jumps over the lazy dog”
was augmented to “The quick brown fox jumps Alzeari over the lazy Superintendents dog”. The
augmented dataset was used only for task 3a because the classes of task 3a were not balanced.
As shown in Table 3 the “false” class has a significantly higher number of instances, hence, we
applied augmentation for other classes. Table 5 shows the dataset statistics before and after
augmentation.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Features Extraction</title>
        <p>The setup for all the algorithms is consistent throughout, with the only diference being the
augmented dataset for task 3a. The logistic regression, multi-layer perceptron, random forest
and support vector machine performed well in the experiments. For all the machine learning
algorithms, word -gram features including uni-gram, bi-gram and tri-gram were used. Final
results were concluded using tri-gram features and term frequency—inverse document frequency
for all experiments.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Results</title>
      <p>The best performing results were submitted for both tasks. For task 3a the logistic regression
model and for task 3b multi-layer perceptron model was submitted in the competition. Table 6
shows the results of the development set which shows logistic regression outperforming in task
3a with the support vector machine being the close second. Multi-layer perceptron performed
the best in task 3a while support vector machine has the second best results. Table 7 shows
how the machine learning model performed in comparison to the top 5 results presented in
the competition. Our model achieved 5th place in the challenge in task 3b while in task 3a we
ranked 10th. The best performing model in task 3a achieved the F1-macro of 83.70 and had
a significant diference compared to our scores. While on task 3b machine learning models
showed noteworthy results with 78.96 F1-macro.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>In this paper, we analysed various machine learning algorithms to obtain the best F1 for fake
news claim classification and topic classification. Our results show that machine learning models
with -gram features are capable of competing albeit with limitations. The augmented dataset
used for task 3a could not improve the results as the insertion of alternative words was not
beneficial. Our model for task 3b achieved noteworthy results and we were placed fifth in the
ranks for task 3b with 78.96 F1-macro.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>The work was done with partial support from the Mexican Government through the grant
A1-S47854 of the CONACYT, Mexico and grants 20211784, 20211884, and 20211178 of the Secretaría
de Investigación y Posgrado of the Instituto Politécnico Nacional, Mexico. The authors thank the
CONACYT for the computing resources brought to them through the Plataforma de Aprendizaje
Profundo para Tecnologías del Lenguaje of the Laboratorio de Supercómputo of the INAOE,
Mexico.
[40] J. Pennington, R. Socher, C. D. Manning, Glove: Global vectors for word representation, in:
Proceedings of the 2014 Conference on Rmpirical Methods in Natural Language Processing
(EMNLP), 2014, pp. 1532–1543.
[41] V. W. Feng, G. Hirst, Detecting deceptive opinions with profile compatibility, in:
Proceedings of the Sixth International Joint Conference on Natural Language Processing, 2013, pp.
338–346.
[42] H. Zhang, Z. Fan, J. Zheng, Q. Liu, An improving deception detection method in
computermediated communication, Journal of Networks 7 (2012) 1811.
[43] E. Tacchini, G. Ballarin, M. L. D. Vedova, S. Moret, L. de Alfaro, Some like it hoax: Automated
fake news detection in social networks, 2017. arXiv:1704.07506.
[44] S. Gilda, Notice of violation of ieee publication principles: Evaluating machine learning
algorithms for fake news detection, in: 2017 IEEE 15th Student Conference on Research
and Development (SCOReD), 2017, pp. 110–115. doi:10.1109/SCORED.2017.8305411.
[45] J. Ma, W. Gao, K.-F. Wong, Rumor detection on Twitter with tree-structured recursive
neural networks, Association for Computational Linguistics, 2018.
[46] N. Ruchansky, S. Seo, Y. Liu, Csi: A hybrid deep model for fake news detection, in:
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management,
2017, pp. 797–806.
[47] Y. Liu, Y.-F. Wu, Early detection of fake news on social media through propagation path
classification with recurrent and convolutional networks, in: Proceedings of the AAAI
Conference on Artificial Intelligence, volume 32, 2018.
[48] G. Sidorov, S. Miranda-Jiménez, F. Viveros-Jiménez, A. Gelbukh, N. Castro-Sánchez,
F. Velásquez, I. Díaz-Rangel, S. Suárez-Guerra, A. Trevino, J. Gordon, Empirical study of
machine learning based approach for opinion mining in tweets, in: Mexican International
Conference on Artificial Intelligence, Springer, 2012, pp. 1–14.
[49] C. Baziotis, N. Pelekis, C. Doulkeridis, Datastories at semeval-2017 task 4: Deep lstm
with attention for message-level and topic-based sentiment analysis, in: Proceedings of
the 11th International Workshop on Semantic Evaluation (SemEval-2017), Association for
Computational Linguistics, Vancouver, Canada, 2017, pp. 747–754.
[50] E. Ma, Nlp augmentation, https://github.com/makcedward/nlpaug, 2019.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ameer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ashraf</surname>
          </string-name>
          , G. Sidorov,
          <string-name>
            <given-names>H. G.</given-names>
            <surname>Adorno</surname>
          </string-name>
          <article-title>, Multi-label emotion classification using content-based features in Twitter</article-title>
          ,
          <source>Computación y Sistemas</source>
          <volume>24</volume>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Amjad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ashraf</surname>
          </string-name>
          , H.-
          <string-name>
            <given-names>T.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gelbukh</surname>
          </string-name>
          ,
          <article-title>Urdu sentiment analysis with deep learning methods</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2021</year>
          )
          <fpage>97803</fpage>
          -
          <lpage>97812</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .
          <volume>3093078</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>F.</given-names>
            <surname>Bashir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ashraf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Yaqoob</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rafiq</surname>
          </string-name>
          , R. U. Mustafa,
          <article-title>Human aggressiveness and reactions towards uncertain decisions</article-title>
          ,
          <source>International Journal of ADVANCED AND APPLIED SCIENCES 6</source>
          (
          <year>2019</year>
          )
          <fpage>112</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Butt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ashraf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. H. F.</given-names>
            <surname>Siddiqui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Sidorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gelbukh</surname>
          </string-name>
          ,
          <article-title>Transformer-based extractive social media question answering on TweetQA</article-title>
          ,
          <source>Computación y Sistemas</source>
          <volume>25</volume>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ashraf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Sidorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gelbukh</surname>
          </string-name>
          ,
          <article-title>Individual vs. group violent threats classiifcation in online discussions</article-title>
          ,
          <source>in: Companion Proceedings of the Web Conference</source>
          <year>2020</year>
          , WWW '20,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2020</year>
          , pp.
          <fpage>629</fpage>
          -
          <lpage>633</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Butt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ashraf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Sidorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gelbukh</surname>
          </string-name>
          ,
          <article-title>Sexism identification using BERT and data augmentation - EXIST2021</article-title>
          , in: International
          <source>Conference of the Spanish Society for Natural Language Processing SEPLN</source>
          <year>2021</year>
          ,
          <article-title>IberLEF 2021</article-title>
          , Spain,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R. U.</given-names>
            <surname>Mustafa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ashraf</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. S.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ferzund</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shahzad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gelbukh</surname>
          </string-name>
          ,
          <article-title>A multiclass depression detection in social media based on sentiment analysis</article-title>
          ,
          <source>in: 17th International Conference on Information Technology-New Generations (ITNG</source>
          <year>2020</year>
          ), Springer International Publishing, Cham,
          <year>2020</year>
          , pp.
          <fpage>659</fpage>
          -
          <lpage>662</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Zubiaga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Liakata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Procter</surname>
          </string-name>
          ,
          <article-title>Exploiting context for rumour detection in social media</article-title>
          ,
          <source>in: International Conference on Social Informatics</source>
          , Springer,
          <year>2017</year>
          , pp.
          <fpage>109</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L.</given-names>
            <surname>Derczynski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bontcheva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Liakata</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Procter</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. W. S.</given-names>
            <surname>Hoi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zubiaga</surname>
          </string-name>
          , Semeval
          <article-title>-2017 task 8: Rumoureval: Determining rumour veracity and support for rumours</article-title>
          ,
          <source>arXiv preprint arXiv:1704.05972</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Hassan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Arslan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tremayne</surname>
          </string-name>
          ,
          <article-title>Toward automated fact-checking: Detecting check-worthy factual claims by claimbuster</article-title>
          ,
          <source>in: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1803</fpage>
          -
          <lpage>1812</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>J.</given-names>
            <surname>Thorne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vlachos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Christodoulopoulos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mittal</surname>
          </string-name>
          ,
          <article-title>Fever: a large-scale dataset for fact extraction and verification</article-title>
          , arXiv preprint arXiv:
          <year>1803</year>
          .
          <volume>05355</volume>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Rubin</surname>
            ,
            <given-names>V. L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            , Yimin, Conroy,
            <given-names>N. K,</given-names>
          </string-name>
          <article-title>Deception detection for news: Three types of fakes</article-title>
          ,
          <source>Proceedings of the Association for Information Science and Technology</source>
          <volume>52</volume>
          (
          <year>2015</year>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Feng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Banerjee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <article-title>Syntactic stylometry for deception detection</article-title>
          ,
          <source>in: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics (Volume</source>
          <volume>2</volume>
          :
          <string-name>
            <surname>Short</surname>
            <given-names>Papers)</given-names>
          </string-name>
          ,
          <year>2012</year>
          , pp.
          <fpage>171</fpage>
          -
          <lpage>175</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>A. K. Chaudhry</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Baker</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Thun-Hohenstein</surname>
          </string-name>
          ,
          <article-title>Stance detection for the fake news challenge: Identifying textual relationships with deep neural nets, CS224n: Natural Language Processing with Deep Learning (</article-title>
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Ghanem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rosso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Rangel</surname>
          </string-name>
          ,
          <article-title>Stance detection in fake news a combined feature representation</article-title>
          ,
          <source>in: Proceedings of the first workshop on fact extraction and VERification (FEVER)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>66</fpage>
          -
          <lpage>71</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>I.</given-names>
            <surname>Augenstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Rocktäschel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vlachos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bontcheva</surname>
          </string-name>
          ,
          <article-title>Stance detection with bidirectional conditional encoding</article-title>
          ,
          <source>arXiv preprint arXiv:1606.05464</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>C.</given-names>
            <surname>Burfoot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Baldwin</surname>
          </string-name>
          ,
          <article-title>Automatic satire detection: Are you having a laugh?</article-title>
          ,
          <source>in: Proceedings of the ACL-IJCNLP 2009 conference short papers</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>161</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Reganti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Maheshwari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Das</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Bajpai</surname>
          </string-name>
          ,
          <article-title>Modeling satire in english text for automatic detection</article-title>
          ,
          <source>in: 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>970</fpage>
          -
          <lpage>977</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>C.</given-names>
            <surname>Hansen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Hansen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Alstrup</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Grue</given-names>
            <surname>Simonsen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lioma</surname>
          </string-name>
          ,
          <article-title>Neural check-worthiness ranking with weak supervision: Finding sentences for fact-checking</article-title>
          ,
          <source>in: Companion Proceedings of the 2019 World Wide Web Conference</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>994</fpage>
          -
          <lpage>1000</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Nakov</surname>
          </string-name>
          , G. Da San Martino, T. Elsayed,
          <string-name>
            <given-names>A.</given-names>
            <surname>Barrón-Cedeño</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Míguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shaar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Haouari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hasanain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Babulkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nikolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. K.</given-names>
            <surname>Shahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Struß</surname>
          </string-name>
          , T. Mandl,
          <string-name>
            <surname>The</surname>
            <given-names>CLEF</given-names>
          </string-name>
          -
          <year>2021</year>
          <article-title>CheckThat! lab on detecting check-worthy claims, previously fact-checked claims, and fake news</article-title>
          ,
          <source>in: Proceedings of the 43rd European Conference on Information Retrieval</source>
          , ECIR '21,
          <string-name>
            <surname>Lucca</surname>
          </string-name>
          , Italy,
          <year>2021</year>
          , pp.
          <fpage>639</fpage>
          -
          <lpage>649</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>P.</given-names>
            <surname>Nakov</surname>
          </string-name>
          , G. Da San Martino, T. Elsayed,
          <string-name>
            <given-names>A.</given-names>
            <surname>Barrón-Cedeño</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Míguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shaar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Haouari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hasanain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Babulkov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nikolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. K.</given-names>
            <surname>Shahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Struß</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Mandl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Modha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kutlu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. S.</given-names>
            <surname>Kartal</surname>
          </string-name>
          ,
          <article-title>Overview of the CLEF-2021 CheckThat! Lab on Detecting Check-Worthy Claims, Previously Fact-Checked Claims, and Fake News</article-title>
          ,
          <source>in: Proceedings of the 12th International Conference of the CLEF Association: Information Access Evaluation Meets Multiliguality</source>
          , Multimodality, and Visualization, CLEF '
          <year>2021</year>
          , Bucharest, Romania (online),
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>G. K.</given-names>
            <surname>Shahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Struß</surname>
          </string-name>
          , T. Mandl,
          <article-title>Overview of the CLEF-2021 CheckThat! lab task 3 on fake news detection</article-title>
          , in: Working Notes of CLEF 2021-
          <article-title>Conference and Labs of the Evaluation Forum</article-title>
          , CLEF '
          <year>2021</year>
          , Bucharest, Romania (online),
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>G. K.</given-names>
            <surname>Shahi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Struß</surname>
          </string-name>
          ,
          <source>T. Mandl, Task</source>
          <volume>3</volume>
          : Fake news detection at CLEF-2021
          <source>CheckThat!</source>
          ,
          <year>2021</year>
          . URL: https://doi.org/10.5281/zenodo.4714517. doi:
          <volume>10</volume>
          .5281/zenodo.4714517.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Asudeh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. V.</given-names>
            <surname>Jagadish</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>On detecting cherry-picked trendlines</article-title>
          ,
          <source>Proceedings of the VLDB Endowment</source>
          <volume>13</volume>
          (
          <year>2020</year>
          )
          <fpage>939</fpage>
          -
          <lpage>952</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V. F.</given-names>
            <surname>Hendricks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vestergaard</surname>
          </string-name>
          ,
          <article-title>Alternative facts, misinformation, and fake news</article-title>
          ,
          <source>in: Reality Lost</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>77</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Chakraborty</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Paranjape</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kakarla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ganguly</surname>
          </string-name>
          ,
          <article-title>Stop clickbait: Detecting and preventing clickbaits in online news media</article-title>
          , in: 2016 IEEE/ACM international conference
          <article-title>on advances in social networks analysis and mining (ASONAM)</article-title>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>9</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. J.</given-names>
            <surname>Conroy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. L.</given-names>
            <surname>Rubin</surname>
          </string-name>
          ,
          <article-title>Misleading online content: recognizing clickbait as" false news"</article-title>
          ,
          <source>in: Proceedings of the 2015 ACM on workshop on multimodal deception detection</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>M.</given-names>
            <surname>Potthast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Köpsel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Hagen</surname>
          </string-name>
          ,
          <article-title>Clickbait detection</article-title>
          ,
          <source>in: European Conference on Information Retrieval</source>
          , Springer,
          <year>2016</year>
          , pp.
          <fpage>810</fpage>
          -
          <lpage>817</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kiesel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mestre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shukla</surname>
          </string-name>
          , E. Vincent,
          <string-name>
            <given-names>P.</given-names>
            <surname>Adineh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Corney</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potthast</surname>
          </string-name>
          , Semeval
          <article-title>-2019 task 4: Hyperpartisan news detection</article-title>
          ,
          <source>in: Proceedings of the 13th International Workshop on Semantic Evaluation</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>829</fpage>
          -
          <lpage>839</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Petrak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bontcheva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Maynard</surname>
          </string-name>
          ,
          <article-title>Team bertha von suttner at semeval-2019 task 4: Hyperpartisan news detection using elmo sentence representation convolutional network</article-title>
          ,
          <source>in: Proceedings of the 13th International Workshop on Semantic Evaluation</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>840</fpage>
          -
          <lpage>844</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>G. L.</given-names>
            <surname>Ciampaglia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Shiralkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. M.</given-names>
            <surname>Rocha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bollen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Menczer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Flammini</surname>
          </string-name>
          ,
          <article-title>Computational fact checking from knowledge networks</article-title>
          ,
          <source>PloS one 10</source>
          (
          <year>2015</year>
          )
          <article-title>e0128193</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>S.</given-names>
            <surname>Oraby</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Compton</surname>
          </string-name>
          , E. Rilof,
          <string-name>
            <given-names>M.</given-names>
            <surname>Walker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Whittaker</surname>
          </string-name>
          ,
          <article-title>And that's a fact: Distinguishing factual and emotional argumentation in online dialogue</article-title>
          ,
          <source>arXiv preprint arXiv:1709.05295</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Yu</surname>
          </string-name>
          , Ti-cnn:
          <article-title>Convolutional neural networks for fake news detection</article-title>
          , arXiv preprint arXiv:
          <year>1806</year>
          .
          <volume>00749</volume>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , L. Cui,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. B.</given-names>
            <surname>Gouza</surname>
          </string-name>
          ,
          <article-title>Fake news detection with deep difusive network model</article-title>
          , arXiv preprint arXiv:
          <year>1805</year>
          .
          <volume>08751</volume>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>H.</given-names>
            <surname>Rashkin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. Y.</given-names>
            <surname>Jang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Volkova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <article-title>Truth of varying shades: Analyzing language in fake news and political fact-checking</article-title>
          ,
          <source>in: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>2931</fpage>
          -
          <lpage>2937</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>D.</given-names>
            <surname>Fallis</surname>
          </string-name>
          ,
          <article-title>A functional analysis of disinformation</article-title>
          ,
          <source>iConference 2014 Proceedings</source>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>E. C.</given-names>
            <surname>Tandoc Jr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. W.</given-names>
            <surname>Lim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ling</surname>
          </string-name>
          ,
          <article-title>Defining “fake news” a typology of scholarly definitions</article-title>
          ,
          <source>Digital journalism 6</source>
          (
          <year>2018</year>
          )
          <fpage>137</fpage>
          -
          <lpage>153</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>G.</given-names>
            <surname>Bhatt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nagpal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Raman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mittal</surname>
          </string-name>
          ,
          <article-title>Combining neural, statistical and external features for fake news stance identification</article-title>
          ,
          <source>in: Companion Proceedings of the The Web Conference</source>
          <year>2018</year>
          ,
          <year>2018</year>
          , pp.
          <fpage>1353</fpage>
          -
          <lpage>1357</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>V.</given-names>
            <surname>Pérez-Rosas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kleinberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lefevre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mihalcea</surname>
          </string-name>
          ,
          <article-title>Automatic detection of fake news</article-title>
          ,
          <source>arXiv preprint arXiv:1708.07104</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>