共 22 条
[1]
Aggarwal CC, 2014, CH CRC DATA MIN KNOW, P1
[2]
Al-Khateeb S, 2019, LECT NOTES SOC NETW, P19, DOI 10.1007/978-3-319-78256-0_2
[3]
[Anonymous], 2018, MACHINE LEARNING TEX
[4]
Identifying Fake News and Fake Users on Twitter
[J].
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018),
2018, 126
:451-461
[5]
Benkler Y., 2018, NETWORK PROPAGANDA M, DOI DOI 10.1093/OSO/9780190923624.001.0001
[6]
Conroy Niall J, 2015, Proc. Assoc. Inf. Sci. Technol, P82, DOI DOI 10.1002/PRA2.2015.145052010082
[7]
Feldman R., 2007, TEXT MINING HDB ADV
[8]
Kai Shu, 2017, ACM SIGKDD Explorations Newsletter, V19, P22, DOI 10.1145/3137597.3137600
[9]
Khonji M., 2012, International Journal for Information Security Research (IJISR), V2, P40
[10]
Kotenko I., 2017, J WIREL MOB NETW UBI, V8, P60, DOI 10.22667/JOWUA.2018.12.31.071