SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5379
Fake News Detection: A Survey
Vaishnavi R1, AnithaKumari S2
1Student, Dept. of Computer Science and Engineering, LBS Institute of Technology for Women, Kerala, India
2Professor, Dept. of Computer Science and Engineering, LBS Institute of Technology for Women, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Fake news is a fabricated information which
widely spreads due to the immense usage of social media and
online news sites to deceive people. Because of the easier
access to the social media people tries getting news via these
online medias and hence its easier to deceive people if thefake
news is spread through it. Thus we could say that obtaining
news from social media has two sides, one is the possibility of
consuming different aspects of a single news easily and the
other is the manipulation of the news due to private opinions
or interest. Most of the times a fake news become
unidentifiable with a real one. Also, social media is an easier
platform to widely spread an informationandattheendofthe
day it deliberately causes someone to believe what is not true
and has the ability to create an immense impactonthesociety.
This paper is a study on different techniques that deals with
the classification of a news as real or fake.
Key Words: Fake News, Real News, Machine Learning,
Deep Learning, Natural Language Processing
1. INTRODUCTION
Internet plays an important role in our daily life and can
reach millions of users within minutes. Its ease ofaccessand
lesser expense makes the people around to consume news
from online medias. Social media provides a platform for
sharing different information andviews ona topicandhence
it causes a fake news to be created and spreaded faster
through online medias rather than a traditional media like
television or newspaper. It is also difficult to identify a fake
news as there exists no dominion of publishing information
or there exists no control over the spread of information.
Fake news is false information that might be created by an
individual or organization inorder to deceivepeopleordone
for some material advantages. Social media is the biggest
source of spreading fake news as anyone can spread an
information from anywhere atanytime.Spreadingfakenews
has a pessimistic motive behind such as damaging a person
or entity’s image on the society, gaining financially or
politically and also used for online advertising to improve
ratings. It was also found on a study that fake news spread
during the US presidential election on 2016 had more views
by the users than the real news spread through the media
outlets. There exists various approaches for the
identification of a fake news such as fake news style
detection, crowd sourcing, Social arguments by experts and
Machine Learning approach. Fake news style approach
cannot be relayed on as it says that a real news is well
written. But this doesn’t work as fake news can also be well
written with a good vocabulary support. Crowdsourcingisa
process by which one classifies a news as fake or real on the
basis of the votes obtained from the people on the topic.
Social Argument by experts is a method by which a news is
considered fake or real on the basis of expert’s opinion on
the news and finally Machine Learning approaches uses
various algorithms for the purpose of classification.
2. FAKE NEWS TYPES
The various types of fake news by Authors of paper [7] , in
their recent paper is summarize below.
1. Visual-based: These fake news posts use graphics a lot
more in as content, which may include morphed images,
doctored video, or combination of both [10].
2. User-based: This type of fabricated news is generated by
fake accounts and is targeted to specificaudience whichmay
represent certain age groups, gender, culture, political
affiliations .
3. Knowledge-based: these types posts give scientific (so
called) explanation to the some unresolved issues and make
users to believe it is authentic. Forexample natural remedies
of increased sugar level in human body.
4. Style-based posts are written by pseudo journalists who
pretend and copy style of some accredited journalists
5. Stance-based: It actually is representation of truthful
statements in such a way which changes its meaning and
purpose.
3. METHODOLOGIES
3.1 Naïve Bayes Model
 It uses probabilistic approaches and are based on
Bayes theorem. They deal with probability
distribution of variables in the dataset and
predicting the response variable of value
 They are generally used for text classification and
also used in medical diagnosis.
 There are mainly 3 types of naïve base models.
Gaussian Naïve Bayes, Multinomial naïveBayes and
Bernoulli Naïve Bayes.
 Naive Bayes classifier model have worked well in
many complicated real-world situations.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5380
 An advantage of naïve Bayes classifier is that it
requires less training data to access the parameters
necessary for classification.
3.2 Decision Tree:
 It is used to optically serve decisions and decision
making.
 It uses tree like model of both classification and
regression.
 They are commonly used for data mining that
support machine learning.
3.3 Random forest
 It is an ensemble method which can be assigned
both for classification and regression.
 It is a combination of decision trees. Here each tree
will build a random subset of a training dataset.
 Each of the tree gives a prediction and the one with
the majority vote becomes the models prediction.
 Random forest corrects the overfitting habit of
decision trees.
3.4 K nearest neighbour
 They store the entire data set for the
implementation. It is an instant based learning
which is actually done by approximation.
 Their data values are arranged in a feature space.
They depend on the value of ‘k’.
 The data value or the feature unknown to us is
found out by using the value of ‘k’. That is, the
nearest ‘k’ neighbours is taken and most occurring
feature is observed.
 It becomes slow as the volume of data increasesand
becomes impractical in environments where
predictions needs to be made rapidly.
3.5 LSTM
 Traditional neural networks cannot remember or
keep the record of what all is passed beforetheyare
executed this stops the desired influence of words
that comes in the sentence before to have any
influence on the ending words, and it seems like a
major shortcoming. For example, imagine youwant
to classify what kind of event is happening at every
point in a movie. It’s unclear how a traditional
neural network could use its reasoning about
previous events in the film to inform later ones.
 LSTM address this issue. They are networks with
loops in them, allowing information to persist.
 Long short-term memory (LSTM) units are a
building blocks for the layers of a recurrent neural
network (RNN).
 A LSTM unit is composed of a cell, an input gate, an
output gate and a forget gate. The cell is responsible
for "remembering" values over a vast time interval
so that the relation of the word in the starting of the
text can influence the output of the wordlaterinthe
sentence.
4. LITERATURE SURVEY
In [1] a machine learning classification technique called
Naïve Bayes Classification technique was used which
considered each word in the article as independent to
identify the fake news. According to this technique a fake
news might consist of certain specific words and hence
checks the conditional probability. The test data was a
dataset of Facebook and achieved an accuracy of 74%. In [2]
tweets were collected using the twitter API and classified to
trustworthy and untrustworthy sources. The classifier is
trained on this dataset and the classifier is used for the
purpose of detecting a fake news. The approach used was a
weakly supervised learning approach. The classification is
based on the source of the post and the algorithms used are
Naïve Bayes, SVM, Random forest, Neural networks etc. In
the paper [3] an automatic fake news model called
FakeDetector was used which is based on text classification.
It uses a deep diffusive network consisting of two
components called representation feature learning and
credibility label inference. It performs the classification of
falsified news, authors and subjects from online social
networks and evaluating the correspondingperformance. In
[4] the paper represents a model that considers the content
of the article, the client reaction and the source client
advancing and combined these qualities to make three
modules namely Capture, Source and Integrate where
capture depends on the reaction and content and score
depends on the source qualities dependentontheconductof
clients. These two modules are combined with the third to
find whether an article is fake or real. The paper [5], deals
with a developed a model for recognizing fake news in
twitter, which used two twitter datasets CREDBANK and
PHEME where CREDBANK is a dataset for precision
assessment and PHEME for potential talk and journalistic
evaluation of their exactness. The accuracy assessment
strategy was then applied on another dataset named
Buzzfeed’s fake news dataset. In [6] a Machine learning
approach is used that combines the news content with the
social content implemented using a Facebook messenger
chatbot obtaining an accuracy of 81.7%. The paper[7]
proposed two approaches, one a linguistic cueapproachand
the other network analysis approach. The linguistic-based
features basically are extracted from the text content where
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5381
as the network-based features areextractedvia constructing
specific networks among the users who published related
social media posts and both these approaches uses machine
learning techniques for classification and categorized the
news based on degree of accuracy. In the paper [8] NLP
techniques were used to predict fake news on the basis of
the linguistic features of the fake news and the real news
with the assumption that fake news has a difference in its
language on comparison with the fake news. In thepaper [9]
a review on the detection of fake news and the explanation
on the benefits of accessing news information and also
discusses that there exists only a very little quality for the
news obtained through the social media on comparison to
the traditional approaches. The paper also discusses on the
future directions of fake news detection in social media.
5. CONCLUSION
Fake News Detection is an approach for distinguishing
between the real and the fake. Detecting fake news is still a
research topic. With the increasing popularity of social
media more and more people consume news from social
media than traditional news media. In this paper various
types of fake news and also methods to classify the news are
been discussed. The distribution of dataset effectsthe model
and also the datasets are limitedforfakenewsdetection.The
data is preprocessed and NLP is applied consisting of
methods like stop word removal, lemmatization withpartof
speech tagging etc. before a classification model isapplied to
it. An overview of the research shows that earlier
researchers have exploited only the machine learning
techniques whereas now deep learning methods are also
emerging. The topics presented in this paperareexpectedto
become prominent in the discussion around social media,
both from the social and research standpoint.
REFERENCES
[1] Granik, Mykhailo, and Volodymyr Mesyura. "Fake
news detection using naive Bayes classifier." 2017
IEEE First Ukraine Conference on Electrical and
Computer Engineering (UKRCON). IEEE, 2017.
[2] Helmstetter, Stefan, and Heiko Paulheim. "Weakly
supervised learning for fake news detectionon Twitter."
2018 IEEE/ACM International Conference on Advances
in Social Networks Analysis and Mining (ASONAM).
IEEE, 2018.
[3] Zhang, Jiawei, et al. "Fake news detection with deep
diffusive network model." arXiv preprint
arXiv:1805.08751 (2018).
[4] Ruchansky, Natali, Sungyong Seo, and Yan Liu. "Csi: A
hybrid deep model for fake news detection."
Proceedings of the 2017 ACM on Conference on
Information and Knowledge Management. 2017.
[5] Buntain, Cody, and Jennifer Golbeck. "Automatically
identifying fake news in popular Twitter threads."
2017 IEEE International Conference on Smart Cloud
(SmartCloud). IEEE, 2017.
[6] Della Vedova, Marco L., et al. "Automatic online fake
news detection combining content and social signals."
2018 22nd Conference of Open Innovations
Association (FRUCT). IEEE, 2018.
[7] Conroy, Niall J., Victoria L. Rubin, and Yimin Chen.
"Automatic deception detection: Methods for finding
fake news." Proceedings of the Association for
Information Science and Technology 52.1 (2015):1-4.
[8] Bajaj, Samir. "The Pope Has a New Baby! Fake News
Detection Using Deep Learning." (2017).
[9] Shu, Kai, et al. "Fake news detection on social media: A
data mining perspective." ACM SIGKDD Explorations
Newsletter 19.1 (2017): 22-36.
[10]Stahl, Kelly. "Fake news detection in social media."
California State University Stanislaus (2018).
[11]https://en.wikipedia.org/wiki/Long_short-
term_memory
[12]https://en.wikipedia.org/wiki/Decision_tree
[13]https://en.wikipedia.org/wiki/Naive_Bayes_classifier
[14]https://towardsdatascience.com/machine-learning-
basics-with-the-k-nearest-neighbors-algorithm-
6a6e71d01761
[15]https://en.wikipedia.org/wiki/Random_forest
[16]https://towardsdatascience.com/understanding-
random-forest-58381e0602d2

More Related Content

What's hot

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET-  	  Sentiment Analysis of Twitter Data using PythonIRJET-  	  Sentiment Analysis of Twitter Data using Python
IRJET- Sentiment Analysis of Twitter Data using PythonIRJET Journal
 
rpaper
rpaperrpaper
rpaperimu409
 
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster   fake news detection system using logistic regression technique i...Fakebuster   fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...Conference Papers
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Reviewtheijes
 
Prediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersPrediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersIRJET Journal
 
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
IRJET - Implementation of Twitter Sentimental Analysis According to Hash TagIRJET Journal
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET Journal
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacksAboul Ella Hassanien
 
Analysis and Prediction of Sentiments for Cricket Tweets using Hadoop
Analysis and Prediction of Sentiments for Cricket Tweets using HadoopAnalysis and Prediction of Sentiments for Cricket Tweets using Hadoop
Analysis and Prediction of Sentiments for Cricket Tweets using HadoopIRJET Journal
 
Tweet sentiment analysis
Tweet sentiment analysisTweet sentiment analysis
Tweet sentiment analysisAnil Shrestha
 
Vol 7 No 1 - November 2013
Vol 7 No 1 - November 2013Vol 7 No 1 - November 2013
Vol 7 No 1 - November 2013ijcsbi
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET Journal
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
 

What's hot (20)

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
IRJET- Sentiment Analysis of Twitter Data using Python
IRJET-  	  Sentiment Analysis of Twitter Data using PythonIRJET-  	  Sentiment Analysis of Twitter Data using Python
IRJET- Sentiment Analysis of Twitter Data using Python
 
rpaper
rpaperrpaper
rpaper
 
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster   fake news detection system using logistic regression technique i...Fakebuster   fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...
 
Phishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A ReviewPhishing Websites Detection Using Back Propagation Algorithm: A Review
Phishing Websites Detection Using Back Propagation Algorithm: A Review
 
Prediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet UsersPrediction of User Rare Sequential Topic Patterns of Internet Users
Prediction of User Rare Sequential Topic Patterns of Internet Users
 
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
 
IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
H017445260
H017445260H017445260
H017445260
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
Analysis and Prediction of Sentiments for Cricket Tweets using Hadoop
Analysis and Prediction of Sentiments for Cricket Tweets using HadoopAnalysis and Prediction of Sentiments for Cricket Tweets using Hadoop
Analysis and Prediction of Sentiments for Cricket Tweets using Hadoop
 
E017433538
E017433538E017433538
E017433538
 
B017441015
B017441015B017441015
B017441015
 
Tweet sentiment analysis
Tweet sentiment analysisTweet sentiment analysis
Tweet sentiment analysis
 
Vol 7 No 1 - November 2013
Vol 7 No 1 - November 2013Vol 7 No 1 - November 2013
Vol 7 No 1 - November 2013
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
32 99-1-pb
32 99-1-pb32 99-1-pb
32 99-1-pb
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 

Similar to IRJET - Fake News Detection: A Survey

IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
Fake news Detection using Machine Learning
Fake news Detection using Machine LearningFake news Detection using Machine Learning
Fake news Detection using Machine LearningIRJET Journal
 
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET Journal
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGIRJET Journal
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine LearningIRJET Journal
 
Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...IRJET Journal
 
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...IRJET Journal
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
 
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningDetection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningIRJET Journal
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET Journal
 
Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message DetectionIRJET Journal
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
 
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELAGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELIRJET Journal
 
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET Journal
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 

Similar to IRJET - Fake News Detection: A Survey (20)

IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Fake news Detection using Machine Learning
Fake news Detection using Machine LearningFake news Detection using Machine Learning
Fake news Detection using Machine Learning
 
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNINGSENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
SENTIMENT ANALYSIS – SARCASM DETECTION USING MACHINE LEARNING
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
 
Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...
 
Fake News Detection
Fake News DetectionFake News Detection
Fake News Detection
 
Irjet v7 i4693
Irjet v7 i4693Irjet v7 i4693
Irjet v7 i4693
 
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
IRJET- Analytic System Based on Prediction Analysis of Social Emotions from U...
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
Detection of Fake News Using Machine Learning
Detection of Fake News Using Machine LearningDetection of Fake News Using Machine Learning
Detection of Fake News Using Machine Learning
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
Fake News and Message Detection
Fake News and Message DetectionFake News and Message Detection
Fake News and Message Detection
 
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile AssessmentAnomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
 
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODELAGGRESSION DETECTION USING MACHINE LEARNING MODEL
AGGRESSION DETECTION USING MACHINE LEARNING MODEL
 
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage MiningIRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
IRJET - Unauthorized Terror Attack Tracking System using Web Usage Mining
 
IRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET- Honeywords: A New Approach for Enhancing Security
IRJET- Honeywords: A New Approach for Enhancing Security
 
Fake News Detection using Deep Learning
Fake News Detection using Deep LearningFake News Detection using Deep Learning
Fake News Detection using Deep Learning
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 

IRJET - Fake News Detection: A Survey

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5379 Fake News Detection: A Survey Vaishnavi R1, AnithaKumari S2 1Student, Dept. of Computer Science and Engineering, LBS Institute of Technology for Women, Kerala, India 2Professor, Dept. of Computer Science and Engineering, LBS Institute of Technology for Women, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Fake news is a fabricated information which widely spreads due to the immense usage of social media and online news sites to deceive people. Because of the easier access to the social media people tries getting news via these online medias and hence its easier to deceive people if thefake news is spread through it. Thus we could say that obtaining news from social media has two sides, one is the possibility of consuming different aspects of a single news easily and the other is the manipulation of the news due to private opinions or interest. Most of the times a fake news become unidentifiable with a real one. Also, social media is an easier platform to widely spread an informationandattheendofthe day it deliberately causes someone to believe what is not true and has the ability to create an immense impactonthesociety. This paper is a study on different techniques that deals with the classification of a news as real or fake. Key Words: Fake News, Real News, Machine Learning, Deep Learning, Natural Language Processing 1. INTRODUCTION Internet plays an important role in our daily life and can reach millions of users within minutes. Its ease ofaccessand lesser expense makes the people around to consume news from online medias. Social media provides a platform for sharing different information andviews ona topicandhence it causes a fake news to be created and spreaded faster through online medias rather than a traditional media like television or newspaper. It is also difficult to identify a fake news as there exists no dominion of publishing information or there exists no control over the spread of information. Fake news is false information that might be created by an individual or organization inorder to deceivepeopleordone for some material advantages. Social media is the biggest source of spreading fake news as anyone can spread an information from anywhere atanytime.Spreadingfakenews has a pessimistic motive behind such as damaging a person or entity’s image on the society, gaining financially or politically and also used for online advertising to improve ratings. It was also found on a study that fake news spread during the US presidential election on 2016 had more views by the users than the real news spread through the media outlets. There exists various approaches for the identification of a fake news such as fake news style detection, crowd sourcing, Social arguments by experts and Machine Learning approach. Fake news style approach cannot be relayed on as it says that a real news is well written. But this doesn’t work as fake news can also be well written with a good vocabulary support. Crowdsourcingisa process by which one classifies a news as fake or real on the basis of the votes obtained from the people on the topic. Social Argument by experts is a method by which a news is considered fake or real on the basis of expert’s opinion on the news and finally Machine Learning approaches uses various algorithms for the purpose of classification. 2. FAKE NEWS TYPES The various types of fake news by Authors of paper [7] , in their recent paper is summarize below. 1. Visual-based: These fake news posts use graphics a lot more in as content, which may include morphed images, doctored video, or combination of both [10]. 2. User-based: This type of fabricated news is generated by fake accounts and is targeted to specificaudience whichmay represent certain age groups, gender, culture, political affiliations . 3. Knowledge-based: these types posts give scientific (so called) explanation to the some unresolved issues and make users to believe it is authentic. Forexample natural remedies of increased sugar level in human body. 4. Style-based posts are written by pseudo journalists who pretend and copy style of some accredited journalists 5. Stance-based: It actually is representation of truthful statements in such a way which changes its meaning and purpose. 3. METHODOLOGIES 3.1 Naïve Bayes Model  It uses probabilistic approaches and are based on Bayes theorem. They deal with probability distribution of variables in the dataset and predicting the response variable of value  They are generally used for text classification and also used in medical diagnosis.  There are mainly 3 types of naïve base models. Gaussian Naïve Bayes, Multinomial naïveBayes and Bernoulli Naïve Bayes.  Naive Bayes classifier model have worked well in many complicated real-world situations.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5380  An advantage of naïve Bayes classifier is that it requires less training data to access the parameters necessary for classification. 3.2 Decision Tree:  It is used to optically serve decisions and decision making.  It uses tree like model of both classification and regression.  They are commonly used for data mining that support machine learning. 3.3 Random forest  It is an ensemble method which can be assigned both for classification and regression.  It is a combination of decision trees. Here each tree will build a random subset of a training dataset.  Each of the tree gives a prediction and the one with the majority vote becomes the models prediction.  Random forest corrects the overfitting habit of decision trees. 3.4 K nearest neighbour  They store the entire data set for the implementation. It is an instant based learning which is actually done by approximation.  Their data values are arranged in a feature space. They depend on the value of ‘k’.  The data value or the feature unknown to us is found out by using the value of ‘k’. That is, the nearest ‘k’ neighbours is taken and most occurring feature is observed.  It becomes slow as the volume of data increasesand becomes impractical in environments where predictions needs to be made rapidly. 3.5 LSTM  Traditional neural networks cannot remember or keep the record of what all is passed beforetheyare executed this stops the desired influence of words that comes in the sentence before to have any influence on the ending words, and it seems like a major shortcoming. For example, imagine youwant to classify what kind of event is happening at every point in a movie. It’s unclear how a traditional neural network could use its reasoning about previous events in the film to inform later ones.  LSTM address this issue. They are networks with loops in them, allowing information to persist.  Long short-term memory (LSTM) units are a building blocks for the layers of a recurrent neural network (RNN).  A LSTM unit is composed of a cell, an input gate, an output gate and a forget gate. The cell is responsible for "remembering" values over a vast time interval so that the relation of the word in the starting of the text can influence the output of the wordlaterinthe sentence. 4. LITERATURE SURVEY In [1] a machine learning classification technique called Naïve Bayes Classification technique was used which considered each word in the article as independent to identify the fake news. According to this technique a fake news might consist of certain specific words and hence checks the conditional probability. The test data was a dataset of Facebook and achieved an accuracy of 74%. In [2] tweets were collected using the twitter API and classified to trustworthy and untrustworthy sources. The classifier is trained on this dataset and the classifier is used for the purpose of detecting a fake news. The approach used was a weakly supervised learning approach. The classification is based on the source of the post and the algorithms used are Naïve Bayes, SVM, Random forest, Neural networks etc. In the paper [3] an automatic fake news model called FakeDetector was used which is based on text classification. It uses a deep diffusive network consisting of two components called representation feature learning and credibility label inference. It performs the classification of falsified news, authors and subjects from online social networks and evaluating the correspondingperformance. In [4] the paper represents a model that considers the content of the article, the client reaction and the source client advancing and combined these qualities to make three modules namely Capture, Source and Integrate where capture depends on the reaction and content and score depends on the source qualities dependentontheconductof clients. These two modules are combined with the third to find whether an article is fake or real. The paper [5], deals with a developed a model for recognizing fake news in twitter, which used two twitter datasets CREDBANK and PHEME where CREDBANK is a dataset for precision assessment and PHEME for potential talk and journalistic evaluation of their exactness. The accuracy assessment strategy was then applied on another dataset named Buzzfeed’s fake news dataset. In [6] a Machine learning approach is used that combines the news content with the social content implemented using a Facebook messenger chatbot obtaining an accuracy of 81.7%. The paper[7] proposed two approaches, one a linguistic cueapproachand the other network analysis approach. The linguistic-based features basically are extracted from the text content where
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 5381 as the network-based features areextractedvia constructing specific networks among the users who published related social media posts and both these approaches uses machine learning techniques for classification and categorized the news based on degree of accuracy. In the paper [8] NLP techniques were used to predict fake news on the basis of the linguistic features of the fake news and the real news with the assumption that fake news has a difference in its language on comparison with the fake news. In thepaper [9] a review on the detection of fake news and the explanation on the benefits of accessing news information and also discusses that there exists only a very little quality for the news obtained through the social media on comparison to the traditional approaches. The paper also discusses on the future directions of fake news detection in social media. 5. CONCLUSION Fake News Detection is an approach for distinguishing between the real and the fake. Detecting fake news is still a research topic. With the increasing popularity of social media more and more people consume news from social media than traditional news media. In this paper various types of fake news and also methods to classify the news are been discussed. The distribution of dataset effectsthe model and also the datasets are limitedforfakenewsdetection.The data is preprocessed and NLP is applied consisting of methods like stop word removal, lemmatization withpartof speech tagging etc. before a classification model isapplied to it. An overview of the research shows that earlier researchers have exploited only the machine learning techniques whereas now deep learning methods are also emerging. The topics presented in this paperareexpectedto become prominent in the discussion around social media, both from the social and research standpoint. REFERENCES [1] Granik, Mykhailo, and Volodymyr Mesyura. "Fake news detection using naive Bayes classifier." 2017 IEEE First Ukraine Conference on Electrical and Computer Engineering (UKRCON). IEEE, 2017. [2] Helmstetter, Stefan, and Heiko Paulheim. "Weakly supervised learning for fake news detectionon Twitter." 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2018. [3] Zhang, Jiawei, et al. "Fake news detection with deep diffusive network model." arXiv preprint arXiv:1805.08751 (2018). [4] Ruchansky, Natali, Sungyong Seo, and Yan Liu. "Csi: A hybrid deep model for fake news detection." Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. 2017. [5] Buntain, Cody, and Jennifer Golbeck. "Automatically identifying fake news in popular Twitter threads." 2017 IEEE International Conference on Smart Cloud (SmartCloud). IEEE, 2017. [6] Della Vedova, Marco L., et al. "Automatic online fake news detection combining content and social signals." 2018 22nd Conference of Open Innovations Association (FRUCT). IEEE, 2018. [7] Conroy, Niall J., Victoria L. Rubin, and Yimin Chen. "Automatic deception detection: Methods for finding fake news." Proceedings of the Association for Information Science and Technology 52.1 (2015):1-4. [8] Bajaj, Samir. "The Pope Has a New Baby! Fake News Detection Using Deep Learning." (2017). [9] Shu, Kai, et al. "Fake news detection on social media: A data mining perspective." ACM SIGKDD Explorations Newsletter 19.1 (2017): 22-36. [10]Stahl, Kelly. "Fake news detection in social media." California State University Stanislaus (2018). [11]https://en.wikipedia.org/wiki/Long_short- term_memory [12]https://en.wikipedia.org/wiki/Decision_tree [13]https://en.wikipedia.org/wiki/Naive_Bayes_classifier [14]https://towardsdatascience.com/machine-learning- basics-with-the-k-nearest-neighbors-algorithm- 6a6e71d01761 [15]https://en.wikipedia.org/wiki/Random_forest [16]https://towardsdatascience.com/understanding- random-forest-58381e0602d2