<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An analysis of approach to the fake news assessment based on the graph neural networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ihor A. Pilkevych</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro L. Fedorchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola P. Romanchuk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olena M. Naumchak</string-name>
          <email>olenanau@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Korolyov Zhytomyr Military Institute</institution>
          ,
          <addr-line>22 Myru Ave., Zhytomyr, 10004</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>56</fpage>
      <lpage>65</lpage>
      <abstract>
        <p>The experience of Russia's war against Ukraine demonstrates the relevance and necessity of understanding the problems of constant disinformation, the spread of propaganda, and the implementation of destructive negative psychological influence. The issue of dissemination in online media informational messages containing negative psychological influence was researched. Ways of improving the system of monitoring online media using the graph neural networks are considered. The methods of automated fake news detection, based on graph neural networks, were reviewed. The purpose of the article is the analysis of existing approaches that allow identifying destructive signs of influence in text data. It is found that the best way to automate the content analysis process is to use the latest machine learning methods. It was determined and substantiated that graph neural networks are the most reliable and efective solution for the specified task. An approach to automating this procedure based on graph neural networks has been designed and analyzed, which will allow timely and eficient detection and analysis of fake news in the information space of our country. During the research, the process of detecting fake news was simulated. The obtained results showed that the described models of graph neural networks can provide good results in solving the tasks of timely detection and response to threats posed by fake news spread by Russia.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;graph neural networks</kwd>
        <kwd>psychological influences</kwd>
        <kwd>fake news</kwd>
        <kwd>knowledge graph</kwd>
        <kwd>information messages</kwd>
        <kwd>online media</kwd>
        <kwd>information war</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>There is more than one definition of the war waged by Russia against Ukraine, in particular:
“hybrid war”, “new generation war”, “subversive war”, “information war”. Each of these concepts
focuses on the use of non-military means in modern warfare. The importance of the information
sphere of confrontation in modern wars has grown significantly in recent years. Information
technologies are becoming one of the most promising types of weapons. Every year, the scope
of its application increases primarily due to its ease of use.</p>
      <p>
        The oficial military doctrine of the Russian Federation calls for “simultaneous pressure on the
enemy throughout its territory in the global information space”. The Internet is used to spread
propaganda, misinformation, manipulation of facts, including fake news, etc. The experience
of the war of the Russian Federation against Ukraine showed that the enemy widely uses the
capabilities of the global network to spread negative psychological influences as a means of
waging a hybrid war [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        From the first day of its independence, our country became the object of Russian propaganda
and the direction of concentrated and powerful destructive psychological influences [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. In
particular, Russia’s special units widely use the Internet to distribute negative psychological
influences to target audiences [ 3] in distributed special materials of negative psychological
influences which have the form of text messages. Therefore, the search for ways to counteract
the aggressor’s special operations is a relevant research direction.
      </p>
      <p>Special information operations of the Russian Federation are aimed at key democratic
institutions (in particular, electoral ones), and special services of the aggressor state are trying to
intensify internal contradictions in Ukraine and other democratic states. The Russian hybrid
warfare technologies against Ukraine, including information intervention models and
mechanisms, are spreading to other states, quickly adapting to local contexts and regulatory policies
[4]. Restrictive measures (sanctions) and responsibility for their violation and an efective
mechanism for monitoring the information space are one of the efective mechanisms for responding
to disinformation and propaganda activity in the Russian Federation [5].</p>
      <p>The availability of online media, the rapidly growing number of sources of information
(such as news sites, social networks, blogs, websites, etc.) and the ease with which they can be
used to spread information quickly lead to the problem of the viral spread of fake news. The
popularization of social networks has exacerbated this long-standing problem [6]. Now, fake
news has become a major problem for society and individuals, as well as for organizations and
governments fighting disinformation and propaganda [7].</p>
      <p>It should be noted that at the current stage, scientific interest is not the amount of information
and its constant growth, but the structure of distributed data and their relationship. That is why
one of the urgent tasks is the creation of a unique collection of knowledge. For this, first of all,
it is necessary to automate the processes of collecting, analyzing, and summarizing data from
the network. And the requirements for knowledge will be: the ability to read and understand
them both by an automated system and by a person, their structure and sequence.</p>
      <p>A modern tool for presenting and preserving knowledge is knowledge graphs (KG). KG is
a graph in which vertices are unique entities, and edges are connections between them and
their attributes. The advantages of KG include: the ability to model both abstract concepts and
real objects; the ability to think about new connections between existing entities; the ability to
generate new knowledge based on existing knowledge (creation of new entities).</p>
      <p>KG are somewhat similar to relational databases (DBs), but their main diference is
semistructuredness and underlying logical apparatus. (DBs are completely structured and therefore
not “flexible” and not suitable for solving a large number of tasks). For example, KG are currently
used in such fields as information search, natural language processing; semantic technologies
that allow using the semantic load of data in the analysis; machine learning, generation of new
knowledge, etc.</p>
      <p>The use of KG in the field of processing natural language texts can allow automating the
process of monitoring the information space. The purpose of the study is to analyze the
approaches and choose the most efective one for building a knowledge graph for detecting
fake news (informational messages containing negative psychological influences.</p>
      <p>The first knowledge base, on the basis of which the KG was implemented, was DBpedia,
which contains about 6 billion related entities, created on the basis of semantic processing of
articles from Wikipedia [8]. The most famous example is the Google Knowledge Graph. Other
implementations are YAGO [9], WordNet, NELL [10], Freebase (since 2014 as part of Google
Knowledge Graph), Wikidata graph [11], LOD Cloud [12] and other.</p>
      <p>Wikidata is an open, collaboratively edited knowledge base created to present information in
a compatible machine-readable format. The actual information from Wikidata conforms to the
RDF data model, where entities are represented as triplets (, , ). Other information can be
added to the entity description. In [13] other formats were also considered. In particular, they
use a variant of the RDF format – named graphs in the form of quads, where a fourth element
is added to the usual triplet (, , , ). Where  is additional identifier.</p>
      <p>Named graphs extend the RDF ternary model and consider sets of pairs in the form (),
where  is RDF-graph,  is IRI or an empty node in some cases, or maybe even for the default
graph. We can smooth this representation by concatenating  · { } for each such pair, resulting
in fours. Thus, we can encode the quad (, , , ) directly using N-Quads.</p>
      <p>KG accumulate knowledge not only in a human-friendly form, like Wikipedia, but also in a
machine-intelligible form, creating a basis for machine learning and solving intellectual tasks
in various fields.</p>
      <p>For the research being conducted, GIS can be an efective tool in solving the task of automating
the process of collecting and analyzing data from the information space. Namely, the processing
of text data from social Internet services for the purpose of identifying signs of negative
psychological influence and, if possible, finding its original source, author, determining the
purpose of distribution, target audience, to which the psychological influence is directed, etc.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Method</title>
      <p>An example of the construction of a KG when solving the problem of analyzing natural language
texts.</p>
      <p>Having a certain text at the input, the first task is to highlight the named entities and the
connections between them, combining the received facts into a graph. For visualization, we will
use the metafactory platform, which uses the Wikidata knowledge graph. For example, let’s
take an article from Wikipedia about Ukraine. Several key points can be identified from the
text. For example, language, neighbors, population and start building a graph (figure 1).</p>
      <p>We select the predicate “shared border with...” and select the entities corresponding to it. The
platform allows you to select all predicates connecting the selected entities for visualization at
once. Particular attention is drawn to the size of the graph containing only a few entities and
the predicates connecting them.</p>
      <p>Therefore, “Ukraine” is the essence of the KG, which is connected with other entities in the
form of triplets (, , ) or (ℎ, , ), where  ad  represent entities,  – connection between
them. In the case of a built-in GK, examples of linked triplets for the entity “Ukraine” would
be (Ukraine, capital, Kyiv) and (Ukraine, ethnic_groups, Ukrainians), (Ukraine, ethnic_groups,
Crimean Tatars), etc.</p>
      <p>The use of the KG as a basis for the encoder of entities is efective for several reasons: the
distribution of information within the graph allows combining information about the object
itself and about its neighbors in the representation of the object; there are several large-scale
open source KG.</p>
      <p>As mentioned earlier, KG can be presented in two ways. The first is an ontological
representation based on formal logic and semantics. The second – vector representation – uses statistical
mechanisms to minimize the distances between close entities in multidimensional spaces.</p>
      <p>A comparison of the approaches is presented in table 1.</p>
      <p>The main diference between the considered approaches is that the symbolic representation
implies the recording of facts using symbols (for example, RDF triplets), while in the vector
representation the essence and predicates are projected into some d-dimensional space (embedding
space).</p>
      <p>The main idea of the vector representation is to search for a graph vertices mapping function
in a vector space of a certain dimension. That is, a network is taken, fed to the input of a
parametric function-encoder, and at the output we get vector representations.</p>
      <p>The disadvantage of methods based on shallow learning is transductivity – the model learns
vector representations for vertices once and must be retrained every time the graph changes.
Also, the disadvantage is that wandering around the graph is random, so the model will produce
diferent results (representations) each time.</p>
      <p>Deep models – graph neural networks (GNN) – are free from the mentioned shortcomings.
The main idea of which is to build a computational graph for each vertex, the features of which
are determined by the features of its neighbors through a non-linear aggregator. GNN are
capable of processing graphically structured data. Other types of neural networks work with
tabular data, image data (pixel grid), or text data.</p>
      <p>In table 2 shows examples of existing models of graph neural networks and areas (problems)
in which they are used.</p>
      <p>The application of GNN allows prediction to be performed both at the level of nodes and
at the level of connections (edges). This allows us to predict certain properties of unlabeled
nodes based on other nodes and their edges. As for the edges, the prediction of the occurrence
of connections between the vertices in the future can be performed. GNNs can classify nodes or
predict connections in a network by studying the embedding of nodes. These embeddings are
low-dimensional vectors that summarize the positions of nodes in the network as well as the
structure of their local neighborhood. It is also possible to perform graph-level prediction based
on the structural properties of these graphs when the input data is the complete graph. Such a
model can be used, for example, to solve the problem of detecting fake news. Fake news is a
phenomenon of modern propaganda and disinformation, which is widely used by the Russian
Federation in conducting hybrid warfare.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref3">14</xref>
        ] a three-stage approach to the analysis of fake news using KG is proposed:
      </p>
      <sec id="sec-2-1">
        <title>Stage 1 – Encoder of news – coding of the title.</title>
        <p>Stage 2 – Encoder of entities – identification of named entities, coding of individual objects
using KG.</p>
        <p>Stage 3 – Classification of news – final study and classification of news (using, for example,</p>
        <p>GNN).</p>
        <p>
          Based on this and [
          <xref ref-type="bibr" rid="ref4">15</xref>
          ], we have the following steps of the GNN model:
1) embedding nodes is done using several rounds of message passing:
2) combining node embeddings into a single graph embedding (called a reading layer, for
example: global mean pool);
3) classifier training based on graph embedding.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>The architecture of the GNN model is shown in the figure 2.</title>
        <sec id="sec-2-2-1">
          <title>Knowledge Graphs AlCigonmmpelnetteodf kknnoowwlleeddggee bgarsaepshs</title>
          <p>Text
Image
Text classification</p>
          <p>Marking sequences
Classification by tonality
Neural machine translation</p>
          <p>Edge extraction
Event extraction</p>
          <p>Text generation
Reading comprehension</p>
          <p>Relational thinking</p>
          <p>Image classification
Visual answers to questions</p>
          <p>Interaction detection</p>
          <p>Region classification
Semantic segmentation
Algorithm</p>
          <p>GCN</p>
          <p>GAT
DGCNN</p>
          <p>Text GCN
Sentence LSTM</p>
          <p>GraphSAGE</p>
          <p>Model
Graph Convolutional Network</p>
          <p>Graph Attention Network
Graph Convolutional Network</p>
          <p>Graph LSTM
GraphSAGE</p>
          <p>GAT Graph Attention Network</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>SenTrteenecLeSLTSMTM Graph LSTM</title>
          <p>GraphSAGE GraphSAGE</p>
          <p>GAT Graph Attention Network
Syntatic GCN Graph Convolutional Network</p>
          <p>GGNN Gated Graph Neural Network</p>
        </sec>
        <sec id="sec-2-2-3">
          <title>GTrraepehLLSSTTMM Graph LSTM</title>
          <p>GCN Graph Convolutional Network
Syntatic GCN Graph Neural Network
GraphSAGE GraphSAGE</p>
          <p>GAT</p>
          <p>GGNN
Sentence LSTM</p>
          <p>GraphSAGE</p>
          <p>GAT
RNN
GCN
DGP
GSNN
GGNN</p>
          <p>GPNN
Strucrural-RNN</p>
          <p>GNN
DGCNN</p>
          <p>GGNN
Graph LSTM
3DGNN</p>
          <p>GNN
GCN</p>
          <p>Graph Attention Network
Gated Graph Neural Network</p>
          <p>Graph LSTM</p>
          <p>GraphSAGE
Graph Attention Network</p>
          <p>MLP</p>
          <p>Reccurent Neural Network
Graph Convolutional Network
Gated Graph Neural Network</p>
          <p>Graph Neural Network
Graph Convolution Network
Gated Graph Neural Network</p>
          <p>Graph LSTM</p>
          <p>Graph Neural Network
Graph Convolutional Network</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results</title>
      <p>
        The User Preference-aware Fake News Detection (UPFD) data set was used to study the
application of the proposed GNN model [
        <xref ref-type="bibr" rid="ref5">16</xref>
        ]. This dataset consists of fact-checked fake and real news
stories received and distributed on Twitter by Politifact and GossipCop [
        <xref ref-type="bibr" rid="ref6">17</xref>
        ]. About 20 million
messages from users involved in spreading fake news were processed. Nodes of the data set
are characterized by four types of features, held due to the use of pre-trained models of the
transformer, word2vec and from the profile of the Twitter account, its comments. The data was
split into two datasets: the training set, which contains about 70% of the total dataset, and the
test set, which contains the rest of the dataset.
      </p>
      <p>
        The solution was built on the basis of GCN, GAT [
        <xref ref-type="bibr" rid="ref7">18</xref>
        ] and GraphSAGE [
        <xref ref-type="bibr" rid="ref8">19</xref>
        ] models. Models
were trained using cross-entropy losses with class weights. They are evaluated according to the
average accuracy measured on the test sets. The selection of hyperparameters consisted of the
type and number of GNN convolutions used for node embedding, the activation function, and
the learning rate. GNN models were trained for 100 epochs. The results obtained during model
training are shown in table 3.
      </p>
      <p>As can be seen from the results of model training, the best results were obtained when using
the GraphSAGE model. The advantage of the GraphSAGE model compared to other GNN
models is that it uses only a set of fixed size formed by uniform sampling for aggregation.</p>
      <p>Therefore, to solve the problem, it is advisable to use the GraphSAGE model trained on
selected text data containing signs of negative psychological influence. Such a model will be
able to analyze and detect textual data containing destructive content with signs of negative
psychological impact in the process of online media monitoring. An important condition is the
availability of a significant amount of training data for training the model.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions and future work</title>
      <p>Therefore, the issue of analyzing messages from online mass media for the purpose of detecting
fake news remains relevant and has become more acute in the conditions of a large-scale war. In
order to timely identify and respond to the negative impact that spreads through such messages,
it is necessary to improve monitoring systems. The article developed and analyzed an approach
to the automation of this process based on graph neural networks, which will allow timely and
qualitative detection and analysis of fake news in the information space of our country.</p>
      <p>KG can be used to supplement training samples for machine learning algorithms, which
allows improving the performance of applications with a limited amount of training data – for
example, systems for analyzing the tonality (sentiment analysis) of messages to determine the
level of negative impact; vocal expressions. Since the KG contains auxiliary factual information
about the elements contained in the training samples (entities from the texts on which the
model is trained), it helps to expand its functionality. This addition increases the accuracy of
classification when detecting fake news.</p>
      <p>A perspective direction for further research is to increasing the level of automation of
content analysis, in particular textual information, by developing and implementing methods of
automatic semantic analysis of texts and determining their content based on neural networks,
in particular, using graph classification, regression, and clustering.
[3] G. E. Howard, M. Czekaj (Eds.), Russia’s Military Strategy and Doctrine, Jamestown</p>
      <p>Foundation, 2019, pp. 159–184.
[4] S. Woolley, P. Howard, Automation, Algorithms, and Politics| Political Communication,
Computational Propaganda, and Autonomous Agents — Introduction, International Journal
of Communication 10 (2016). URL: https://ijoc.org/index.php/ijoc/article/view/6298.
[5] Stratehiia informatsiinoi bezpeky, 2021. URL: https://www.president.gov.ua/documents/
6852021-41069.
[6] H. Allcott, M. Gentzkow, Social Media and Fake News in the 2016 Election, Journal of</p>
      <p>Economic Perspectives 31 (2017) 211–36. doi:10.1257/jep.31.2.211.
[7] A. J. Berinsky, Rumors and Health Care Reform: Experiments in Political
Misinformation, British Journal of Political Science 47 (2017) 241–262. doi:10.1017/
S0007123415000186.
[8] P. N. Mendes, M. Jakob, A. García-Silva, C. Bizer, DBpedia Spotlight: Shedding Light on
the Web of Documents, in: Proceedings of the 7th International Conference on Semantic
Systems, I-Semantics ’11, Association for Computing Machinery, New York, NY, USA,
2011, p. 1–8. doi:10.1145/2063518.2063519.
[9] T. Rebele, F. Suchanek, J. Hofart, J. Biega, E. Kuzey, G. Weikum, YAGO: A
Multilingual Knowledge Base from Wikipedia, Wordnet, and Geonames, in: The
Semantic Web – ISWC 2016: 15th International Semantic Web Conference, Kobe, Japan,
October 17–21, 2016, Proceedings, Part II, Springer-Verlag, Berlin, Heidelberg, 2016,
p. 177–185. URL: https://suchanek.name/work/publications/iswc-2016-yago.pdf. doi:10.
1007/978-3-319-46547-0_19.
[10] J. M. Giménez-García, M. C. Duarte, A. Zimmermann, C. Gravier, E. R. H. Jr., P. Maret,
NELL2RDF: Reading the Web, Tracking the Provenance, and Publishing it as Linked Data,
in: S. Capadisli, F. Cotton, J. M. Giménez-García, A. Haller, E. Kalampokis, V. Nguyen,
A. P. Sheth, R. Troncy (Eds.), Joint Proceedings of the International Workshops on
Contextualized Knowledge Graphs, and Semantic Statistics co-located with 17th International
Semantic Web Conference (ISWC 2018), volume 2317 of CEUR Workshop Proceedings,
CEUR-WS.org, 2018. URL: https://ceur-ws.org/Vol-2317/article-02.pdf.
[11] A. Waagmeester, G. Stupp, S. Burgstaller-Muehlbacher, B. M. Good, M. Grifith, O. L.</p>
      <p>Grifith, K. Hanspers, H. Hermjakob, T. S. Hudson, K. Hybiske, S. M. Keating, M. Manske,
M. Mayers, D. Mietchen, E. Mitraka, A. R. Pico, T. Putman, A. Riutta, N. Queralt-Rosinach,
L. M. Schriml, T. Shafee, D. Slenter, R. Stephan, K. Thornton, G. Tsueng, R. Tu, S. Ul-Hasan,
E. Willighagen, C. Wu, A. I. Su, Science Forum: Wikidata as a knowledge graph for the
life sciences, eLife 9 (2020) e52614. doi:10.7554/eLife.52614.
[12] A. Jentzsch, Linked Open Data Cloud, in: T. Pellegrini, H. Sack, S. Auer (Eds.), Linked
Enterprise Data: Management und Bewirtschaftung vernetzter Unternehmensdaten mit
Semantic Web Technologien, X.media.press, Springer Berlin Heidelberg, Berlin, Heidelberg,
2014, pp. 209–219. doi:10.1007/978-3-642-30274-9_10.
[13] D. Hernández, A. Hogan, M. Krötzsch, Reifying RDF: What Works Well With Wikidata?,
in: T. Liebig, A. Fokoue (Eds.), Proceedings of the 11th International Workshop on Scalable
Semantic Web Knowledge Base Systems co-located with 14th International Semantic Web
Conference (ISWC 2015), Bethlehem, PA, USA, October 11, 2015, volume 1457 of CEUR
Workshop Proceedings, CEUR-WS.org, 2015, pp. 32–47. URL: https://ceur-ws.org/Vol-1457/</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>T.</given-names>
            <surname>Vakaliuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Pilkevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fedorchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Osadchyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tokar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Naumchak</surname>
          </string-name>
          ,
          <article-title>Methodology of monitoring negative psychological influences in online media</article-title>
          ,
          <source>Educational Technology Quarterly</source>
          <year>2022</year>
          (
          <year>2022</year>
          )
          <fpage>143</fpage>
          -
          <lpage>151</lpage>
          . doi:
          <volume>10</volume>
          .55056/etq.1.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O. V.</given-names>
            <surname>Levchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Kosogov</surname>
          </string-name>
          ,
          <article-title>Methods of identification of events of negative information influence based on the analysis of open sources</article-title>
          ,
          <source>Systemy obrobky informatsii 1</source>
          (
          <year>2016</year>
          )
          <fpage>100</fpage>
          -
          <lpage>102</lpage>
          . URL: http://nbuv.gov.ua/UJRN/soi_2016_
          <volume>1</volume>
          _
          <fpage>22</fpage>
          . SSWS2015_paper3.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mayank</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , DEAP-FAKED:
          <article-title>Knowledge Graph based Approach for Fake News Detection</article-title>
          , in: 2022
          <source>IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>47</fpage>
          -
          <lpage>51</lpage>
          . doi:
          <volume>10</volume>
          .1109/ASONAM55673.
          <year>2022</year>
          .
          <volume>10068653</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>I.</given-names>
            <surname>Pilkevych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Fedorchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Naumchak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Romanchuk</surname>
          </string-name>
          ,
          <article-title>Fake News Detection in the Framework of Decision-Making System through Graph Neural Network</article-title>
          ,
          <source>in: 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>153</fpage>
          -
          <lpage>157</lpage>
          . doi:
          <volume>10</volume>
          .1109/AICT52120.
          <year>2021</year>
          .
          <volume>9628907</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Shu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Xia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. Sun,</surname>
          </string-name>
          <article-title>User Preference-Aware Fake News Detection</article-title>
          ,
          <source>in: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval</source>
          , SIGIR '21,
          <string-name>
            <surname>Association</surname>
          </string-name>
          for Computing Machinery, New York, NY, USA,
          <year>2021</year>
          , p.
          <fpage>2051</fpage>
          -
          <lpage>2055</lpage>
          . doi:
          <volume>10</volume>
          .1145/3404835.3462990.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N.</given-names>
            <surname>Vo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Lee</surname>
          </string-name>
          , PolitiFact,
          <year>2020</year>
          . URL: https://paperswithcode.com/dataset/politifact.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Veličković</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Cucurull</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Casanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Romero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Liò</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Bengio</surname>
          </string-name>
          , Graph Attention Networks,
          <year>2018</year>
          . arXiv:
          <volume>1710</volume>
          .
          <fpage>10903</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>W. L.</given-names>
            <surname>Hamilton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ying</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          ,
          <source>Inductive Representation Learning on Large Graphs, in: Proceedings of the 31st International Conference on Neural Information Processing Systems</source>
          , NIPS'17, Curran Associates Inc.,
          <string-name>
            <surname>Red</surname>
            <given-names>Hook</given-names>
          </string-name>
          ,
          <string-name>
            <surname>NY</surname>
          </string-name>
          , USA,
          <year>2017</year>
          , p.
          <fpage>1025</fpage>
          -
          <lpage>1035</lpage>
          . doi:
          <volume>10</volume>
          . 5555/3294771.3294869.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>