Loading [MathJax]/extensions/MathMenu.js
Enhanced and Efficient Gated Recurrent Unit and Long Short-Term Memory Architectures for Detecting False Information | IEEE Conference Publication | IEEE Xplore

Enhanced and Efficient Gated Recurrent Unit and Long Short-Term Memory Architectures for Detecting False Information


Abstract:

In the digital era, the rapid dissemination of false information has emerged as a formidable challenge, undermining the credibility of online platforms and posing a threa...Show More

Abstract:

In the digital era, the rapid dissemination of false information has emerged as a formidable challenge, undermining the credibility of online platforms and posing a threat to informed public discourse. Addressing this issue, our research introduces innovative enhancements to Gated Recurrent Unit (GRU) and Long Short-Term Memory (LSTM) architectures, aimed at bolstering the efficiency and accuracy of false information detection mechanisms. Leveraging the inherent strengths of GRU and LSTM models in capturing temporal dependencies within data, our proposed modifications incorporate adaptive learning rates and a novel hybrid attention mechanism. These enhancements facilitate a more nuanced understanding of the contextual and stylistic nuances characteristic of false information, thereby significantly improving the models’ predictive performance. Through extensive experimentation on a diverse dataset comprising various forms of digital content, our findings reveal that the enhanced GRU and LSTM architectures outperform existing models in terms of detection accuracy, while simultaneously reducing computational overhead. This advancement in deep learning techniques represents a pivotal step towards more reliable and efficient false information detection, with potential applications spanning across social media platforms, news outlets, and beyond. Our research not only contributes to the academic discourse on natural language processing and misinformation studies but also offers practical solutions for safeguarding the integrity of information in the digital landscape.
Date of Conference: 18-19 April 2024
Date Added to IEEE Xplore: 07 August 2024
ISBN Information:
Conference Location: Chikkaballapur, India
References is not available for this document.

I. Introduction

In the current digital age, the proliferation of online platforms has facilitated unprecedented access to information, simultaneously engendering a landscape ripe for the dissemination of false information. This phenomenon, characterized by the spread of misinformation, disinformation, and mal information, poses significant challenges to societal trust, public health, and democratic processes. The imperative to detect and mitigate the spread of false information is thus not only a technological challenge but also a societal necessity. Traditional methods of content verification, relying heavily on manual fact-checking and rule-based algorithms, are increasingly inadequate in the face of the volume, velocity, and variety of content generated online. This inadequacy underscores the necessity for more sophisticated, scalable, and automated solutions.

Select All
1.
S. Hochreiter and J. Schmidhuber, "Long short-term memory", Neural computation, vol. 9, no. 8, pp. 1735-1780, 1997.
2.
K. Cho, B. Van Merrinboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, et al., "Learning phrase representations using RNN encoder-decoder for statistical machine translation", arXiv preprint arXiv:1406.1078, 2014.
3.
X. Zhou, R. Zafarani, K. Shu and H. Liu, "Fake news: A survey of research detection methods and opportunities", ACM Computing Surveys (CSUR), vol. 53, no. 5, pp. 1-40, 2015.
4.
A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, et al., "Attention is all you need", Advances in neural information processing systems, vol. 30, 2017.
5.
D. P. Kingma and J. Ba, Adam: A method for stochastic optimization, 2014.
6.
J. Wu Zhou and X. Zeng, "A Survey on Automatic Detection of Fake News in Social Media", Journal of Computer Science and Technology, vol. 31, no. 5, pp. 989-1007, Sep. 2016.
7.
L. Xu Lai, K. Liu and J. Zhao, "Recurrent Convolutional Neural Networks for Text Classification", Proc. of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pp. 2267-2273, 2015.
8.
N. Shazeer Vaswani, N. Parmar et al., "Attention Is All You Need", Proc: of the 31st International Conference on Neural Information Processing Systems (NIPS), pp. 5998-6008, 2017.
9.
J. Zhao Zhang and Y. LeCun, "Character-level Convolutional Networks for Text Classification", Proc. of the Advances in Neural Information Processing Systems 28 (NIPS), pp. 649-657, 2018.
10.
Kingma and J. Ba, "Adam: A Method for Stochastic Optimization", Proc. of the 3rd International Conference for Learning Representations, 2014.
11.
Pan and Q. Yang, "A Survey on Transfer Learning", IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 10, pp. 1345-1359, Oct. 2010.
12.
A. Sliva Shu, S. Wang, J. Tang and H. Liu, "Fake News Detection on Social Media: A Data Mining Perspective", ACM SIGKDD Explorations Newsletter, vol. 22, no. 1, pp. 22-36, June 2020.
13.
T. Tieleman and G. Hinton, "Lecture 6.5-rmsprop: Divide the Gradient by a Running Average of Its Recent Magnitude", COURSERA: Neural Networks for Machine Learning, 2012.
14.
Y. Bengio et al., "Advances in Neural Information Processing Systems", NIPS, pp. 309-317, 2013.
15.
I. Goodfellow, Y. Bengio and A. Courville, Deep Learning, MIT Press, 2016.

Contact IEEE to Subscribe

References

References is not available for this document.