SlideShare a Scribd company logo
1 of 6
Base paper Title: Deepfake Detection on Social Media: Leveraging Deep Learning and
FastText Embeddings for Identifying Machine-Generated Tweets
Modified Title: Using Deep Learning and FastText Embeddings to Identify Machine-
Generated Tweets in Deepfake Detection on Social Media
Abstract
Recent advancements in natural language production provide an additional tool to
manipulate public opinion on social media. Furthermore, advancements in language modelling
have significantly strengthened the generative capabilities of deep neural models, empowering
them with enhanced skills for content generation. Consequently, text-generative models have
become increasingly powerful allowing the adversaries to use these remarkable abilities to
boost social bots, allowing them to generate realistic deepfake posts and influence the discourse
among the general public. To address this problem, the development of reliable and accurate
deepfake social media message-detecting methods is important. Under this consideration,
current research addresses the identification of machine-generated text on social networks like
Twitter. In this study, a straightforward deep learning model in combination with word
embeddings is employed for the classification of tweets as human-generated or bot-generated
using a publicly available Tweepfake dataset. A conventional Convolutional Neural Network
(CNN) architecture is devised, leveraging FastText word embeddings, to undertake the task of
identifying deepfake tweets. To showcase the superior performance of the proposed method,
this study employed several machine learning models as baseline methods for comparison.
These baseline methods utilized various features, including Term Frequency, Term Frequency-
Inverse Document Frequency, FastText, and FastText subword embeddings. Moreover, the
performance of the proposed method is also compared against other deep learning models such
as Long short-term memory (LSTM) and CNN-LSTM displaying the effectiveness and
highlighting its advantages in accurately addressing the task at hand. Experimental results
indicate that the streamlined design of the CNN architecture, coupled with the utilization of
FastText embeddings, allowed for efficient and effective classification of the tweet data with a
superior 93% accuracy.
Existing System
SOCIAL media platforms were created for people to connect and share their opinions
and ideas through texts, images, audio, and videos [1]. A bot is computer software that manages
a fake account on social media by liking, sharing, and uploading posts that may be real or
forged using techniques like gap-filling text, search-and- replace, and video editing or deepfake
[2]. Deep learning is a part of machine learning that learns feature representation from input
data. Deepfake is a combination of "deep learning" and "fake" and refers to artificial
intelligence-generated multimedia (text, image, audio and video) that may be misleading [3].
Deepfake multimedia’s creation and sharing on social media have already created problems in
a number of fields such as politics [4] by deceiving viewers into thinking that they were created
by humans. Using social media, it is easier and faster to propagate false information with the
aim of manipulating people’s perceptions and opinions especially to build mistrust in a
democratic country [5]. Accounts with varying degrees of humanness like cyborg accounts to
sockpuppets are used to achieve this goal [6]. On the other hand, fully automated social media
accounts also known as social bots mimic human behaviour [7]. Particularly, the widespread
use of bots and recent developments in natural language-based generative models, such as the
GPT [8] and Grover [9], give the adversary a means to propagate false information more
convincingly. The Net Neutrality case in 2017 serves as an illustrative example: millions of
duplicated comments played a significant role in the Commission’s decision to repeal [10]. The
issue needs to be addressed that simple text manipulation techniques may build false beliefs
and what could be the impact of more powerful transformer-based models. Recently, there have
been instances of the use of GPT-2 [11] and GPT-3 [12]: to generate tweets to test the
generating skills and automatically make blog articles. A bot based on GPT-3 interacted with
people on Reddit using the account "/u/thegentlemetre" to post comments to inquiries on
/r/AskReddit [13]. Though most of the remarks made by the bot were harmless. Despite the
fact that no harm has been done thus far, OpenAI should be concerned about the misuse of
GPT-3 due to this occurrence. However, in order to protect genuine information and democracy
on social media, it is important to create a sovereign detection system for machine-generated
texts, also known as deepfake text.
Drawback in Existing System
 Data Bias:
The effectiveness of deepfake detection models heavily relies on the quality and
diversity of the training data. If the training data is biased or not representative of the
entire range of deepfake techniques, the model may struggle to generalize to new and
unseen types of deepfakes.
 Generalization to New Deepfake Techniques:
Deep learning models may struggle to generalize to new and emerging deepfake
techniques that were not present in the training data. Deepfake technology evolves
rapidly, and models may become obsolete if they are not regularly updated with new
data.
 Explainability and Interpretability:
Deep learning models, especially complex ones, often lack transparency and
interpretability. Understanding how the model reaches a particular decision can be
challenging, making it difficult to trust and explain the detection results, which is
important for user acceptance and legal considerations.
 False Positives and Negatives:
Deepfake detection models may produce false positives (incorrectly flagging genuine
content as deepfake) or false negatives (failing to detect actual deepfakes). Striking a
balance between sensitivity and specificity is crucial to avoid the negative impact of
both types of errors.
Proposed System
 Data Preprocessing:
Clean and preprocess the collected data, including text normalization, removing
irrelevant information, and handling missing or noisy data. Tokenize the text into words
or sub-word units for input to the deep learning model.
 Feature Extraction with FastText Embeddings:
Utilize FastText embeddings to convert the textual content of tweets into dense vector
representations. FastText embeddings capture semantic information and can handle
out-of-vocabulary words, providing a robust representation for machine-generated text.
 Deep Learning Model Architecture:
Design a deep learning model for tweet classification. This model should take the
FastText embeddings as input and output a probability score indicating the likelihood
of the tweet being machine-generated. Consider using architectures like recurrent
neural networks (RNNs), long short-term memory networks (LSTMs), or transformer
models for capturing sequential dependencies in the text.
 Integration with Social Media Platforms:
Develop an interface or integration with social media platforms to enable real-time or
batch processing of tweets. Ensure compliance with the platforms' APIs and privacy
policies. Consider providing feedback mechanisms for users to report false positives or
negatives.
Algorithm
 FastText Embeddings:
Utilize the FastText algorithm to generate word embeddings for the textual content
of tweets. FastText is capable of capturing sub-word information, making it effective
for handling misspellings, out-of-vocabulary words, and variations in language.
 Explainable AI Techniques:
Incorporate techniques for explainability, such as attention mechanisms or LIME
(Local Interpretable Model-agnostic Explanations), to provide insights into the model's
decision-making process. Explainability is essential for building trust and
understanding the model's behavior.
 Evaluation Metrics:
Use appropriate evaluation metrics such as precision, recall, F1-score, and area under
the Receiver Operating Characteristic (ROC) curve to assess the performance of your
deepfake detection model. Consider the trade-off between false positives and false
negatives based on the application's requirements.
Advantages
 Robust Textual Representations:
FastText embeddings provide robust representations of textual content by capturing
semantic relationships and sub-word information. This can enhance the model's ability
to understand the nuances of language, including misspellings, slang, and variations.
 Adaptability to New Deepfake Techniques:
Deep learning models are capable of learning complex patterns from data, enabling
them to adapt to new and emerging deepfake techniques. Regular updates and retraining
can ensure the model remains effective against evolving threats.
 Model Generalization:
The use of FastText embeddings and deep learning models enables the system to
generalize well to new and unseen data. This is important for accurately detecting
machine-generated content across a variety of contexts.
 Continuous Improvement:
The system can be designed for continuous learning and improvement. Regular
updates to the model based on new data and emerging trends in deepfake techniques
contribute to the long-term effectiveness of the deepfake detection system.
Software Specification
 Processor : I3 core processor
 Ram : 4 GB
 Hard disk : 500 GB
Software Specification
 Operating System : Windows 10 /11
 Frond End : Python
 Back End : Mysql Server
 IDE Tools : Pycharm

More Related Content

Similar to Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embeddings for Identifying Machine-Generated Tweets.docx

IRJET - Fake News Detection using Machine Learning
IRJET -  	  Fake News Detection using Machine LearningIRJET -  	  Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine LearningIRJET Journal
 
Fake accounts detection system based on bidirectional gated recurrent unit n...
Fake accounts detection system based on bidirectional gated  recurrent unit n...Fake accounts detection system based on bidirectional gated  recurrent unit n...
Fake accounts detection system based on bidirectional gated recurrent unit n...IJECEIAES
 
The Identification of Depressive Moods from Twitter Data by Using Convolution...
The Identification of Depressive Moods from Twitter Data by Using Convolution...The Identification of Depressive Moods from Twitter Data by Using Convolution...
The Identification of Depressive Moods from Twitter Data by Using Convolution...IRJET Journal
 
IRJET - Mobile Chatbot for Information Search
 IRJET - Mobile Chatbot for Information Search IRJET - Mobile Chatbot for Information Search
IRJET - Mobile Chatbot for Information SearchIRJET Journal
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...IRJET Journal
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine LearningIRJET Journal
 
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster   fake news detection system using logistic regression technique i...Fakebuster   fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...Conference Papers
 
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...mlaij
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsCSCJournals
 
Derogatory Comment Classification
Derogatory Comment ClassificationDerogatory Comment Classification
Derogatory Comment ClassificationIRJET Journal
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
 
Design of Chatbot using Deep Learning
Design of Chatbot using Deep LearningDesign of Chatbot using Deep Learning
Design of Chatbot using Deep LearningIRJET Journal
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionvivatechijri
 
Artificial Intelligence Approach for Covid Period StudyPal
Artificial Intelligence Approach for Covid Period StudyPalArtificial Intelligence Approach for Covid Period StudyPal
Artificial Intelligence Approach for Covid Period StudyPalIRJET Journal
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...IRJET Journal
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paperFiras Husseini
 
Top 5 Artificial intelligence [AI].pdf
Top 5 Artificial intelligence [AI].pdfTop 5 Artificial intelligence [AI].pdf
Top 5 Artificial intelligence [AI].pdfthe knowledge
 

Similar to Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embeddings for Identifying Machine-Generated Tweets.docx (20)

IRJET - Fake News Detection using Machine Learning
IRJET -  	  Fake News Detection using Machine LearningIRJET -  	  Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
 
tweet segmentation
tweet segmentation tweet segmentation
tweet segmentation
 
Fake accounts detection system based on bidirectional gated recurrent unit n...
Fake accounts detection system based on bidirectional gated  recurrent unit n...Fake accounts detection system based on bidirectional gated  recurrent unit n...
Fake accounts detection system based on bidirectional gated recurrent unit n...
 
The Identification of Depressive Moods from Twitter Data by Using Convolution...
The Identification of Depressive Moods from Twitter Data by Using Convolution...The Identification of Depressive Moods from Twitter Data by Using Convolution...
The Identification of Depressive Moods from Twitter Data by Using Convolution...
 
IRJET - Mobile Chatbot for Information Search
 IRJET - Mobile Chatbot for Information Search IRJET - Mobile Chatbot for Information Search
IRJET - Mobile Chatbot for Information Search
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
Fake News Detection Using Machine Learning
Fake News Detection Using Machine LearningFake News Detection Using Machine Learning
Fake News Detection Using Machine Learning
 
Fakebuster fake news detection system using logistic regression technique i...
Fakebuster   fake news detection system using logistic regression technique i...Fakebuster   fake news detection system using logistic regression technique i...
Fakebuster fake news detection system using logistic regression technique i...
 
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
 
Derogatory Comment Classification
Derogatory Comment ClassificationDerogatory Comment Classification
Derogatory Comment Classification
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
Design of Chatbot using Deep Learning
Design of Chatbot using Deep LearningDesign of Chatbot using Deep Learning
Design of Chatbot using Deep Learning
 
ijeter35852020.pdf
ijeter35852020.pdfijeter35852020.pdf
ijeter35852020.pdf
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
Artificial Intelligence Approach for Covid Period StudyPal
Artificial Intelligence Approach for Covid Period StudyPalArtificial Intelligence Approach for Covid Period StudyPal
Artificial Intelligence Approach for Covid Period StudyPal
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
 
Top 5 Artificial intelligence [AI].pdf
Top 5 Artificial intelligence [AI].pdfTop 5 Artificial intelligence [AI].pdf
Top 5 Artificial intelligence [AI].pdf
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embeddings for Identifying Machine-Generated Tweets.docx

  • 1. Base paper Title: Deepfake Detection on Social Media: Leveraging Deep Learning and FastText Embeddings for Identifying Machine-Generated Tweets Modified Title: Using Deep Learning and FastText Embeddings to Identify Machine- Generated Tweets in Deepfake Detection on Social Media Abstract Recent advancements in natural language production provide an additional tool to manipulate public opinion on social media. Furthermore, advancements in language modelling have significantly strengthened the generative capabilities of deep neural models, empowering them with enhanced skills for content generation. Consequently, text-generative models have become increasingly powerful allowing the adversaries to use these remarkable abilities to boost social bots, allowing them to generate realistic deepfake posts and influence the discourse among the general public. To address this problem, the development of reliable and accurate deepfake social media message-detecting methods is important. Under this consideration, current research addresses the identification of machine-generated text on social networks like Twitter. In this study, a straightforward deep learning model in combination with word embeddings is employed for the classification of tweets as human-generated or bot-generated using a publicly available Tweepfake dataset. A conventional Convolutional Neural Network (CNN) architecture is devised, leveraging FastText word embeddings, to undertake the task of identifying deepfake tweets. To showcase the superior performance of the proposed method, this study employed several machine learning models as baseline methods for comparison. These baseline methods utilized various features, including Term Frequency, Term Frequency- Inverse Document Frequency, FastText, and FastText subword embeddings. Moreover, the performance of the proposed method is also compared against other deep learning models such as Long short-term memory (LSTM) and CNN-LSTM displaying the effectiveness and highlighting its advantages in accurately addressing the task at hand. Experimental results indicate that the streamlined design of the CNN architecture, coupled with the utilization of FastText embeddings, allowed for efficient and effective classification of the tweet data with a superior 93% accuracy.
  • 2. Existing System SOCIAL media platforms were created for people to connect and share their opinions and ideas through texts, images, audio, and videos [1]. A bot is computer software that manages a fake account on social media by liking, sharing, and uploading posts that may be real or forged using techniques like gap-filling text, search-and- replace, and video editing or deepfake [2]. Deep learning is a part of machine learning that learns feature representation from input data. Deepfake is a combination of "deep learning" and "fake" and refers to artificial intelligence-generated multimedia (text, image, audio and video) that may be misleading [3]. Deepfake multimedia’s creation and sharing on social media have already created problems in a number of fields such as politics [4] by deceiving viewers into thinking that they were created by humans. Using social media, it is easier and faster to propagate false information with the aim of manipulating people’s perceptions and opinions especially to build mistrust in a democratic country [5]. Accounts with varying degrees of humanness like cyborg accounts to sockpuppets are used to achieve this goal [6]. On the other hand, fully automated social media accounts also known as social bots mimic human behaviour [7]. Particularly, the widespread use of bots and recent developments in natural language-based generative models, such as the GPT [8] and Grover [9], give the adversary a means to propagate false information more convincingly. The Net Neutrality case in 2017 serves as an illustrative example: millions of duplicated comments played a significant role in the Commission’s decision to repeal [10]. The issue needs to be addressed that simple text manipulation techniques may build false beliefs and what could be the impact of more powerful transformer-based models. Recently, there have been instances of the use of GPT-2 [11] and GPT-3 [12]: to generate tweets to test the generating skills and automatically make blog articles. A bot based on GPT-3 interacted with people on Reddit using the account "/u/thegentlemetre" to post comments to inquiries on /r/AskReddit [13]. Though most of the remarks made by the bot were harmless. Despite the fact that no harm has been done thus far, OpenAI should be concerned about the misuse of GPT-3 due to this occurrence. However, in order to protect genuine information and democracy on social media, it is important to create a sovereign detection system for machine-generated texts, also known as deepfake text.
  • 3. Drawback in Existing System  Data Bias: The effectiveness of deepfake detection models heavily relies on the quality and diversity of the training data. If the training data is biased or not representative of the entire range of deepfake techniques, the model may struggle to generalize to new and unseen types of deepfakes.  Generalization to New Deepfake Techniques: Deep learning models may struggle to generalize to new and emerging deepfake techniques that were not present in the training data. Deepfake technology evolves rapidly, and models may become obsolete if they are not regularly updated with new data.  Explainability and Interpretability: Deep learning models, especially complex ones, often lack transparency and interpretability. Understanding how the model reaches a particular decision can be challenging, making it difficult to trust and explain the detection results, which is important for user acceptance and legal considerations.  False Positives and Negatives: Deepfake detection models may produce false positives (incorrectly flagging genuine content as deepfake) or false negatives (failing to detect actual deepfakes). Striking a balance between sensitivity and specificity is crucial to avoid the negative impact of both types of errors. Proposed System  Data Preprocessing: Clean and preprocess the collected data, including text normalization, removing irrelevant information, and handling missing or noisy data. Tokenize the text into words or sub-word units for input to the deep learning model.
  • 4.  Feature Extraction with FastText Embeddings: Utilize FastText embeddings to convert the textual content of tweets into dense vector representations. FastText embeddings capture semantic information and can handle out-of-vocabulary words, providing a robust representation for machine-generated text.  Deep Learning Model Architecture: Design a deep learning model for tweet classification. This model should take the FastText embeddings as input and output a probability score indicating the likelihood of the tweet being machine-generated. Consider using architectures like recurrent neural networks (RNNs), long short-term memory networks (LSTMs), or transformer models for capturing sequential dependencies in the text.  Integration with Social Media Platforms: Develop an interface or integration with social media platforms to enable real-time or batch processing of tweets. Ensure compliance with the platforms' APIs and privacy policies. Consider providing feedback mechanisms for users to report false positives or negatives. Algorithm  FastText Embeddings: Utilize the FastText algorithm to generate word embeddings for the textual content of tweets. FastText is capable of capturing sub-word information, making it effective for handling misspellings, out-of-vocabulary words, and variations in language.  Explainable AI Techniques: Incorporate techniques for explainability, such as attention mechanisms or LIME (Local Interpretable Model-agnostic Explanations), to provide insights into the model's decision-making process. Explainability is essential for building trust and understanding the model's behavior.
  • 5.  Evaluation Metrics: Use appropriate evaluation metrics such as precision, recall, F1-score, and area under the Receiver Operating Characteristic (ROC) curve to assess the performance of your deepfake detection model. Consider the trade-off between false positives and false negatives based on the application's requirements. Advantages  Robust Textual Representations: FastText embeddings provide robust representations of textual content by capturing semantic relationships and sub-word information. This can enhance the model's ability to understand the nuances of language, including misspellings, slang, and variations.  Adaptability to New Deepfake Techniques: Deep learning models are capable of learning complex patterns from data, enabling them to adapt to new and emerging deepfake techniques. Regular updates and retraining can ensure the model remains effective against evolving threats.  Model Generalization: The use of FastText embeddings and deep learning models enables the system to generalize well to new and unseen data. This is important for accurately detecting machine-generated content across a variety of contexts.  Continuous Improvement: The system can be designed for continuous learning and improvement. Regular updates to the model based on new data and emerging trends in deepfake techniques contribute to the long-term effectiveness of the deepfake detection system. Software Specification  Processor : I3 core processor  Ram : 4 GB  Hard disk : 500 GB
  • 6. Software Specification  Operating System : Windows 10 /11  Frond End : Python  Back End : Mysql Server  IDE Tools : Pycharm