Transactions on Machine Intelligence

Transactions on Machine Intelligence

Model for Detecting Fake News on Twitter

Document Type : Original Article

Authors
1 Department of Network Science and Technology, School of Advanced Science and Technology, University of Tehran, Iran
2 Assistant Professor, Department of Network Science and Technology, School of Advanced Science and Technology, University of Tehran, Iran
Abstract
Due to the widespread use of social networks by people of all ages, distinguishing between fake and real news on these platforms has become a significant challenge in today's world. Individuals who disseminate fake news on social networks often aim to achieve various commercial, political, and economic goals. Therefore, identifying and distinguishing real news from fake news is crucial in addressing this issue. The objective of this research is to present an intelligent model for detecting fake news using a news propagation tree in the social network Twitter. The dataset used in this study is sourced from the political news section of the Fake News Net website. Initially, a news propagation tree was constructed for both real and fake news using this dataset, followed by the development of features from structural, temporal, and syntactic perspectives based on the news propagation tree. Finally, machine learning algorithms were employed to build a model for predicting fake and real news. The results indicated that among the algorithms used for modeling, the Random Forest algorithm, with an accuracy of 75.8%, was the best model for distinguishing fake news from real news.
Keywords

  • Shu, K., Zhou, X., Wang, S., Zafarani, R., & Liu, H. (2019). The role of user profiles for fake news detection. In Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 436-439). https://doi.org/10.1145/3341161.3342927
  • Shu, K., Mahudeswaran, D., Wang, S., & Liu, H. (2020). Hierarchical propagation networks for fake news detection: Investigation and exploitation. In Proceedings of the International AAAI Conference on Web and Social Media (Vol. 14, pp. 626-637). https://doi.org/10.1609/icwsm.v14i1.7329
  • Han, J., Kamber, M., & Pei, J. (2012). Data mining: Concepts and techniques.
  • Mahjoubi, J., & Etemad-Shahidi, A. (2007). Estimation of wind-induced wave heights in Neka using regression decision trees.
  • Kumar, S., & Sahoo, G. (2017). A random forest classifier based on genetic algorithm for cardiovascular diseases diagnosis. International Journal of Engineering Transactions B: Applications, 30, 1723-1729. https://doi.org/10.5829/ije.2017.30.11b.13
  • Mitchell, R., & Frank, E. (2017). Accelerating the XGBoost algorithm using GPU computing. PeerJ Computer Science, 3, e127. https://doi.org/10.7717/peerj-cs.127
  • Belaid, S., & Mellit, A. (2016). Prediction of daily and mean monthly global solar radiation using support vector machine in an arid climate. Energy Conversion and Management, 118, 105-118. https://doi.org/10.1016/j.enconman.2016.03.082
  • Chang, C.-C., & Lin, C.-J. (2011). LIBSVM: A library for support vector machines. ACM Trans. Intell. Syst. Technol., 2, 27:1-27:27. https://doi.org/10.1145/1961189.1961199
  • Wang, H., Wang, Y., Zhou, Z., Ji, X., Li, Z., Gong, D., Zhou, J., & Liu, W. (2018). CosFace: Large Margin Cosine Loss for Deep Face Recognition. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 5265-5274. https://doi.org/10.1109/CVPR.2018.00552
  • Yadgari, V., & Matinfar, A. R. (2019). Detection of Web Denial-of-Service attacks using entropy and support vector machine algorithm. Electronic and Cyber Defense, 4(4), 79-89.
Volume 3, Issue 3
Summer 2020
Pages 149-158

  • Receive Date 04 May 2020
  • Revise Date 23 June 2020
  • Accept Date 05 September 2020