Skip to main content

Showing 1–3 of 3 results for author: Gambini, M

Searching in archive cs. Search in all archives.
.
  1. The Anatomy of Conspirators: Unveiling Traits using a Comprehensive Twitter Dataset

    Authors: Margherita Gambini, Serena Tardelli, Maurizio Tesconi

    Abstract: The discourse around conspiracy theories is currently thriving amidst the rampant misinformation in online environments. Research in this field has been focused on detecting conspiracy theories on social media, often relying on limited datasets. In this study, we present a novel methodology for constructing a Twitter dataset that encompasses accounts engaged in conspiracy-related activities throug… ▽ More

    Submitted 5 February, 2024; v1 submitted 29 August, 2023; originally announced August 2023.

    Journal ref: Computer Communications, 217 (2024), 25-40

  2. arXiv:2204.10710  [pdf, ps, other

    cs.SI cs.AI

    Tweets2Stance: Users stance detection exploiting Zero-Shot Learning Algorithms on Tweets

    Authors: Margherita Gambini, Tiziano Fagni, Caterina Senette, Maurizio Tesconi

    Abstract: In the last years there has been a growing attention towards predicting the political orientation of active social media users, being this of great help to study political forecasts, opinion dynamics modeling and users polarization. Existing approaches, mainly targeting Twitter users, rely on content-based analysis or are based on a mixture of content, network and communication analysis. The recen… ▽ More

    Submitted 22 April, 2022; originally announced April 2022.

  3. TweepFake: about Detecting Deepfake Tweets

    Authors: Tiziano Fagni, Fabrizio Falchi, Margherita Gambini, Antonio Martella, Maurizio Tesconi

    Abstract: The recent advances in language modeling significantly improved the generative capabilities of deep neural models: in 2019 OpenAI released GPT-2, a pre-trained language model that can autonomously generate coherent, non-trivial and human-like text samples. Since then, ever more powerful text generative models have been developed. Adversaries can exploit these tremendous generative capabilities to… ▽ More

    Submitted 6 May, 2021; v1 submitted 31 July, 2020; originally announced August 2020.