Skip to main content

Credibility and Reliability News Evaluation Based on Artificial Intelligent Service with Feature Segmentation Searching and Dynamic Clustering

  • Chapter
  • First Online:
Combating Fake News with Computational Intelligence Techniques

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1001))

  • 1197 Accesses

Abstract

Recently, fake news are spread through Internet, social media, specific organizations or parties. Considering the affection of the fake news to the credibility and reliability, to check and be aware of the news is needed. Based on the artificial intelligence and suitable k-means grouping method, the existed and proved fake news could be used to train the proposed system. The features of the fake news could be classified and identified according to the proposed system in this research. In addition, according to these found features, the news announced or spread by the specific person, organizations, or group, could be classified as the doubtful news.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Vosoughi, S., Roy, D., & Aral, S. (2018). The spread of true and false news online. Science, 359(6380), 1146–1151. https://doi.org/10.1126/science.aap9559

    Article  Google Scholar 

  2. Gaozhao, D. (2020). Flagging fake news on social media: An experimental study of media consumers’ identification of fake news. SSRN Journal. https://doi.org/10.2139/ssrn.3669375

    Article  Google Scholar 

  3. Albahar, M. (2021). A hybrid model for fake news detection: Leveraging news content and user comments in fake news. IET Information Security, 15, 169–177. https://doi.org/10.1049/ise2.12021

    Article  Google Scholar 

  4. Pivoda, K. (2019). Review of news literacy: Helping students and teachers decode fake news. Education Review, 26. https://doi.org/10.14507/er.v26.2459

  5. Yang, S., Shu, K., Wang, S., Gu, R., Wu, F., & Liu, H. (2019). Unsupervised fake news detection on social media: A generative approach. In Proceedings of the 33rd AAAI conference on artificial intelligence. https://doi.org/10.1609/aaai.v33i01.33015644

  6. Castillo, C., Mendoza, M., & Poblete, B. (2011). Information credibility on twitter. In Proceedings of the 20th international conference on world wide web ACM (pp. 675–684).

    Google Scholar 

  7. Wang, W. Y. (2017). Liar, liar pants on fire: A new benchmark dataset for fake news detection. arXiv preprint. arXiv:1705.00648

  8. Kedar, H. E. (2019). Fake news in media art: Fake news as a media art practice versus fake news in politics. Postdigital Science and Education, 2, 132–146. https://doi.org/10.1007/s42438-019-00053-y.

  9. Chen, K. J., & Bai, M.-H. (1998). Unknown word detection for Chinese by a corpus-based learning method. International Journal of Computational linguistics and Chinese Language Processing, 3(1), 27–44.

    Google Scholar 

  10. Kim, J., Tabibian, B., Oh, A., Scholkopf, B., & Gomez Rodriguez, M. (2018). Leveraging the crowd to detect and reduce the spread of fake news and misinformation. In Proceedings of the 11th ACM international conference on web search and data mining (pp. 324–332).

    Google Scholar 

  11. Jian, M.-S., Hong, W.-C., Tsai, S.-C., Chen, Y.-W., & Fan, C.-L. (2020). Based on automatic correlation keyword grouping and combination based deep information search corresponding to specific language big data—Case of leisure recreation. In Proceedings of the IEEE ICACT (pp. 372–377). https://doi.org/10.23919/ICACT48636.2020.9061481

  12. Erlandsson, F., Nia, R., Boldt, M., Johnson, H., & Wu, S. (2015). Crawling online social networks. In Proceedings of the 2015 2nd ENIC (pp. 9–16).

    Google Scholar 

  13. Hadoop—Introduction. Available online : https://www.tutorialspoint.com/hadoop/hadoop_introduction.htm

  14. Jian, M.-S., Fang, Y.-C., Wang, Y.-K., & Cheng, C. (2017). Big data analysis in hotel customer response and evaluation based on cloud. In Proceedings of the IEEE ICACT (pp. 791–795). https://doi.org/10.23919/ICACT.2017.7890201

  15. Ma, W.-Y., & Chen, K. J. (2003). A bottom-up merging algorithm for Chinese unknown word extraction. In Proceedings of the ACL workshop on Chinese language processing (pp. 31–38).

    Google Scholar 

  16. Yu, C., Pengyu, M., Bessmertny, I. A., Platonov, A. V., & Poleschuk, E. A. (2017). Term extraction from Chinese texts without word segmentation. In IEEE 11th international conference on application of information and communication technologies (AICT) (pp. 1–4). https://doi.org/10.1109/ICAICT.2017.8687047

  17. Saini, C., & Arora, V. (2016). Information retrieval in web crawling: A survey. In International conference on advances in computing, communications and informatics (ICACCI) (pp. 2635–2643). https://doi.org/10.1109/ICACCI.2016.7732456

  18. Varghese, M., & Jose, V. (2018). Big data and cloud computing review and future trends. International Journal of Computer Sciences and Engineering, 6(12), 361–365. https://doi.org/10.26438/ijcse/v6i12.361365

    Article  Google Scholar 

  19. Verma, J. P., Patel, B., & Patel, A. (2015). Big data analysis: Recommendation system with Hadoop framework. In IEEE international conference on computational intelligence and communication technology (pp. 92–97). https://doi.org/10.1109/CICT.2015.86

  20. Hassan, M. U., Yaqoob, I., Zulfiqar, S., & Hameed, I. A. (2021). A comprehensive study of HBase storage architecture—A systematic literature review. Symmetry, 13(109). https://doi.org/10.3390/sym13010109

  21. Jian, M.-S., & You, M.-S. (2016). Cloud based hybrid evolution algorithm for NP-complete pattern in nurse scheduling problem. International Journal of Innovation, Management and Technology, 7(5), 234–237.

    Article  Google Scholar 

  22. https://tfc-taiwan.org.tw/articles/report

  23. Tsai, C.-H. MMSEG: A word identification system for Mandarin Chinese text based on two variants of the maximum matching algorithm. http://technology.chtsai.org/mmseg/

  24. Zhang, X., Wu, P., Cai, J., & Wang, K. (2010). A contrastive study of Chinese text segmentation tools in marketing notification texts. Journal of Physics: Conference Series, 1302(2). https://doi.org/10.1088/1742-6596/1302/2/022010

  25. Hakim, A. A., Erwin, A., Eng, K. I., Galinium, M., & Muliady, W. (2014). Automated document classification for news article in Bahasa Indonesia based on term frequency inverse document frequency (TF-IDF) approach. In 6th International conference on information technology and electrical engineering (ICITEE) (pp. 1–4). https://doi.org/10.1109/ICITEED.2014.7007894

  26. Havrlant, L., & Kreinovich, V. (2017). A simple probabilistic explanation of term frequency-inverse document frequency (tf-idf) heuristic (and variations motivated by this explanation). International Journal of General Systems, 46(1), 27–36. https://doi.org/10.1080/03081079.2017.1291635

    Article  MathSciNet  Google Scholar 

  27. Hishamuddin, M. N. F., Hassan, M. F., Tran, D. C., & Mokhtar, A. A. (2020). Improving classification accuracy of Scikit-learn classifiers with discrete fuzzy interval values. In International conference on computational intelligence (ICCI) (pp. 163–166). https://doi.org/10.1109/ICCI51257.2020.9247696

  28. Brites, D., & Wei, M. (2019). PhishFry—A proactive approach to classify phishing sites using SCIKIT learn. In IEEE Globecom workshops (GC Wkshps) (pp. 1–6). https://doi.org/10.1109/GCWkshps45667.2019.9024428

  29. Syakur, M. A., Khotimah, B. K., Rochman, E. M. S., & Satoto, B. D. (2017). Integration K-means clustering method and elbow method for identification of the best customer profile cluster. IOP Conference Series: Materials Science and Engineering, 336.

    Google Scholar 

  30. Wold, S., Esbensen, K., & Geladi, P. (1987). Principal component analysis. Chemometrics and Intelligent Laboratory Systems, 2, 37–52.

    Article  Google Scholar 

Download references

Acknowledgements

Thanks for the support of Cloud Computing and Intelligent System Lad. (CCIS Lab.) of National Formosa University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming-Shen Jian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jian, MS. (2022). Credibility and Reliability News Evaluation Based on Artificial Intelligent Service with Feature Segmentation Searching and Dynamic Clustering. In: Lahby, M., Pathan, AS.K., Maleh, Y., Yafooz, W.M.S. (eds) Combating Fake News with Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1001. Springer, Cham. https://doi.org/10.1007/978-3-030-90087-8_9

Download citation

Publish with us

Policies and ethics