Hoax Detection System on Twitter using Feed-Forward and Back-Propagation Neural Networks Classification Method

Sistem Deteksi Hoax pada Twitter dengan Metode Klasifikasi Feed-Forward dan Back-Propagation Neural Networks

  • Crisanadenta Wintang Kencana Telkom University
  • Erwin Budi Setiawan Telkom University
  • Isman Kurniawan Telkom University
Keywords: hoax, Twitter, feed-forward, back-propagation, TF-IDF, Word2Vec, pre-processing


Social media is one of the ways to connect every individual in the world. It also used by irresponsible people to spread a hoax. Hoax is false news that is made as if it is true. It may cause anxiety and panic in society. It can affect the social and political conditions. This era, the most popular social media is Twitter. It is a place for sharing information and users around the world can share and receive news in short messages or called tweet. Hoax detection gained significant interest in the last decade. Existing hoax detection methods are based on either news-content or social-context using user-based features. In this study, we present a hoax detection based on FF & BP neural networks. In the developing of it, we used two vectorization methods, TF-IDF and Word2Vec. Our model is designed to automatically learn features for hoax news classification through several hidden layers built into the neural network.  The neural network is actually using the ability of the human brain that is able to provide stimulation, process, and output. It works by the neuron to process every information that enters, then is processed through a network connection, and will continue learning to produce abilities to do classification. Our proposed model would be helpful to provide a better solution for hoax detection. Data collection obtained through crawling used Twitter API and retrieve data according to the keywords and hashtags. The neural networks highest accuracy obtained using TF-IDF by 78.76%. We also found that data quality affects the performance.


Download data is not yet available.


S. Asur and B. A. Huberman, “Predicting the future with social media,” Proc. - 2010 IEEE/WIC/ACM Int. Conf. Web Intell. WI 2010, vol. 1, pp. 492–499, 2010.

B. Narwal, “Fake News in Digital Media,” Proc. - IEEE 2018 Int. Conf. Adv. Comput. Commun. Control Networking, ICACCCN 2018, pp. 977–981, 2018.

J. C. Hernández, C. J. Herńndez, J. M. Sierra, and A. Ribagorda, “A first step towards automatic hoax detection,” IEEE Annu. Int. Carnahan Conf. Secur. Technol. Proc., pp. 102–114, 2002.

P. Assiroj, Meyliana, A. N. Hidayanto, H. Prabowo, and H. L. H. S. Warnars, “Hoax News Detection on Social Media: A Survey,” 1st 2018 Indones. Assoc. Pattern Recognit. Int. Conf. Ina. 2018 - Proc., pp. 186–191, 2019.

K. Sharma, F. Qian, H. Jiang, N. Ruchansky, M. Zhang, and Y. Liu, “Combating fake news: A survey on identification and mitigation techniques,” ACM Trans. Intell. Syst. Technol., vol. 10, no. 3, 2019.

R. K. Kaliyar, A. Goswami, P. Narang, and S. Sinha, “FNDNet – A deep convolutional neural network for fake news detection,” Cogn. Syst. Res., vol. 61, pp. 32–44, 2020.

M. Granik and V. Mesyura, “Fake news detection using naive Bayes classifier,” 2017 IEEE 1st Ukr. Conf. Electr. Comput. Eng. UKRCON 2017 - Proc., pp. 900–903, 2017.

R. Kumar and D. Verma, “Classification Algorithms for Data Mining: A Survey,” Int. J. Innov. Eng. …, vol. 1, no. 2, pp. 7–14, 2012.

Y. Y. Chen, S.-P. Yong, and A. Ishak, “Email Hoax Detection System Using Levenshtein Distance Method,” J. Comput., vol. 9, no. 2, pp. 441–446, 2014.

S. Sneha, N. Fernandez, and S. Rao, “3HAN: A Deep Neural Network for Fake News Detection,” Conf. Pap., no. October, pp. 118–125, 2017.

O. Ajao, D. Bhowmik, and S. Zargari, “Fake news identification on Twitter with hybrid CNN and RNN models,” ACM Int. Conf. Proceeding Ser., no. July, pp. 226–230, 2018.

J. Ma et al., “Detecting rumors from microblogs with recurrent neural networks,” IJCAI Int. Jt. Conf. Artif. Intell., vol. 2016-Janua, pp. 3818–3824, 2016.

N. Ruchansky, S. Seo, and Y. Liu, “CSI: A hybrid deep model for fake news detection,” Int. Conf. Inf. Knowl. Manag. Proc., vol. Part F1318, pp. 797–806, 2017.

X. Zheng, Z. Zeng, Z. Chen, Y. Yu, and C. Rong, “Detecting spammers on social networks,” Neurocomputing, vol. 159, no. 1, pp. 27–34, 2015.

Á. I. Rodríguez and L. L. Iglesias, “Fake News Detection Using Deep Learning Techniques,” 1st IEEE Int. Conf. Adv. Inf. Technol. ICAIT 2019 - Proc., pp. 411–415, 2019.

S. Chakrabarti, “Crawling the Web,” Min. Web, pp. 17–43, 2003.

J. Eka Sembodo, E. Budi Setiawan, and Z. Abdurahman Baizal, “Data Crawling Otomatis pada Twitter,” no. October 2018, pp. 11–16, 2016.

S. N. Kane, A. Mishra, and A. K. Dutta, “Preface: International Conference on Recent Trends in Physics (ICRTP 2016),” J. Phys. Conf. Ser., vol. 755, no. 1, 2016.

P. Jeatrakul, K. W. Wong, and C. C. Fung, “Using misclassification analysis for data cleaning,” IWACIII 2009 - Int. Work. Adv. Comput. Intell. Intell. Informatics, no. January, 2009.

A. Fauzi, E. B. Setiawan, and Z. K. A. Baizal, “Hoax News Detection on Twitter using Term Frequency Inverse Document Frequency and Support Vector Machine Method,” J. Phys. Conf. Ser., vol. 1192, no. 1, 2019.

L. Al Shalabi and Z. Shaaban, “Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference Matrix,” Proc. Int. Conf. Dependability Comput. Syst. DepCoS-RELCOMEX 2006, pp. 207–214, 2006.

M. K. and J. P. J. Han, Data Mining Concepts and Techniques Third Edition. .

M. Jimenez, C. Maxime, Y. Le Traon, and M. Papadakis, “On the impact of tokenizer and parameters on n-gram based code analysis,” Proc. - 2018 IEEE Int. Conf. Softw. Maint. Evol. ICSME 2018, pp. 437–448, 2018.

C. P. Medina and M. R. R. Ramon, “Using TF-IDF to Determine Word Relevance in Document Queries Juan,” New Educ. Rev., vol. 42, no. 4, pp. 40–51, 2015.

X. Rong, “word2vec Parameter Learning Explained,” pp. 1–21, 2014.

E. B. Setiawan, D. H. Widyantoro, and K. Surendro, “Feature expansion using word embedding for tweet topic classification,” Proceeding 2016 10th Int. Conf. Telecommun. Syst. Serv. Appl. TSSA 2016 Spec. Issue Radar Technol., 2017.

R. Bala and D. Kumar, “Classification Using ANN: A Review,” Int. J. Comput. Intell. Res., vol. 13, no. 7, pp. 1811–1820, 2017.

I. N. da Silva, R. A. Flauzino, L. H. B. Liboni, S. F. dos R. A. Alves, and D. H. Spatti, Artificial Neural Networks A Practical Course, vol. 50, no. 2. 1954.

A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet Classification with Deep Convolutional Neural Networks,” ImageNet Classif. with Deep Convolutional Neural Networks, pp. 1–1432, 2007.

S. Ruder, “An overview of gradient descent optimization algorithms,” pp. 1–14, 2016.

N. Qian, “On the Momentum Term in Gradient Descent Learning Algorithms Acknowledgments,” Learning, vol. 5213.

A. K. Santra and C. J. Christy, “Genetic Algorithm and Confusion Matrix for Document Clustering,” Int. J. Comput. Sci. Issues, vol. 9, no. 1, pp. 322–328, 2012.

How to Cite
Crisanadenta Wintang Kencana, Erwin Budi Setiawan, & Isman Kurniawan. (2020). Hoax Detection System on Twitter using Feed-Forward and Back-Propagation Neural Networks Classification Method. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(4), 655 - 663. https://doi.org/10.29207/resti.v4i4.2038
Information Technology Articles

Most read articles by the same author(s)

1 2 > >>