SlideShare a Scribd company logo
FAKE NEWS
DETECTION
Harshda Ghai, Suncity School
Pragya Singhal, The Shri Ram School Aravali
Ananya Grover, Amity International School, Noida
How many of you receive forwarded
news on Whatsapp?
How many of you verify each and every
piece of news you read before believing it?
Research shows that 1 in 2 Indians receives
fake news via Whatsapp and Facebook
As per a survey by Social Media Matters and Institute for Governance, Policies and Politics
SO WHY IS IDENTIFYING FAKE NEWS IMPORTANT?
Because when we don’t, we can be fooled or manipulated- into worsening existing stereotypes,
getting worried about fake disease epidemics, or even influencing whom we vote for.
Fake news detection project
How we set up our problem and data
● We input the domain names, HTML
codes, and labels (0- true, 1-fake) of
2002 news websites to train the model.
● Then we used 309 examples to test it.
The output were labels of either 0 or 1
i.e. real or fake.
Under the broad domain on ‘Natural
Language Processing’, we used different
approaches like keyword search, Bag of
Words, and GloVe.
‘Vectors’ of words
Our best modelA combination of bag-of-words,
word-2-vector, and the feature
description model was found to be the
one which showed us maximum
accuracy.
● BAG OF WORDS- looks at the
count of each word.
● WORD-2-VEC-finds out the
actual meaning of the world
● FEATURE DESCRIPTION-
looking at the ‘url’, and the ‘html’
to infer the difference fake and
real news.
87.39%
Test accuracy
To improve:
● Instead of using only 16 features, we changed to using 616 features in our
word-2-vec model, which was one of the key factors for improving our
accuracy
● Using controversial words which were seen to appear more in fake news
than in real. Eg. bombing, terrorist, Trump
Our confusion matrix
TRUE
POSITIVES
TRUE
NEGATIVES
FALSE
POSITIVES
FALSE
NEGATIVES
Real-World Applications
1) Elections
2) Fake job rackets
3) Checking the credibility of news links received on Whatsapp ,
Facebook , Twitter
4) Fake medical news messages
Case Study-Job rackets
Fishing at reputed job portals: Another way of conning job aspirants is through reputed job portals where
racketeers fish for personal details of job seekers and exploit them later.
"They build a database of critical personal information of unsuspecting candidates which can be dangerously
misused at a later point,” says Chakraborty. In June, police arrested three men from Kavi Nagar in Ghaziabad
for allegedly cheating several job seekers of around Rs 3.5 crore in the last two years.
The mastermind of the racket posed on Naukri.com as representative of fictitious companies such as Idea
International and Entomace Technology India Pvt Ltd and posted jobs. He would collect personal data of
candidates who applied to those jobs. Later, he would send them fake interview letters from big, well-known
companies. He wanted the candidates to pay through Paytm for fixing the interviews so they would get those
jobs.
Real-World Implementation
To implement this in real life, we can make a mobile app or a
Whatsapp-integrated feature.
Users would simply enter the link of a news website and be able to
verify whether a news website is true or fake.
In the future, our improved model could also consider individual
news stories and not just the news website as a whole.
Acknowledgements
Inspirit AI – Dehli Instructors:
Tyler Bonnen, B.S.
Sehj Kashyap, B.S.
Artem Trotsyuk, B.S.
Peter Washington, B.S., M.S.
Nisheeth Ranjan, B.S., M.S.
Debajyoti Datta, B.S., M.S.
The Shri Ram School, Aravali
Family and Friends
Thank you!
Ad

More Related Content

What's hot (20)

Detecting Fake News Through NLP
Detecting Fake News Through NLPDetecting Fake News Through NLP
Detecting Fake News Through NLP
Sakha Global
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
Ashish Arora
 
Fake News Detection using Machine Learning
Fake News Detection using Machine LearningFake News Detection using Machine Learning
Fake News Detection using Machine Learning
ijtsrd
 
Sentiment Analysis using Twitter Data
Sentiment Analysis using Twitter DataSentiment Analysis using Twitter Data
Sentiment Analysis using Twitter Data
Hari Prasad
 
Sms spam-detection
Sms spam-detectionSms spam-detection
Sms spam-detection
Tanvirul Islam
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
sachin narang
 
Text classification & sentiment analysis
Text classification & sentiment analysisText classification & sentiment analysis
Text classification & sentiment analysis
M. Atif Qureshi
 
Sentiment Analysis in Twitter
Sentiment Analysis in TwitterSentiment Analysis in Twitter
Sentiment Analysis in Twitter
Ayushi Dalmia
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
 
Sentiment analysis
Sentiment analysisSentiment analysis
Sentiment analysis
Makrand Patil
 
Machine Learning for Disease Prediction
Machine Learning for Disease PredictionMachine Learning for Disease Prediction
Machine Learning for Disease Prediction
Mustafa Oğuz
 
Housing price prediction
Housing price predictionHousing price prediction
Housing price prediction
Abhimanyu Dwivedi
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detection
Partnered Health
 
Twitter sentiment analysis ppt
Twitter sentiment analysis pptTwitter sentiment analysis ppt
Twitter sentiment analysis ppt
SonuCreation
 
Loan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptxLoan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptx
BhoirRitesh19ET5008
 
Machine learning
Machine learningMachine learning
Machine learning
Rajesh Chittampally
 
Fake news detection
Fake news detection Fake news detection
Fake news detection
shalushamil
 
Project on disease prediction
Project on disease predictionProject on disease prediction
Project on disease prediction
KOYELMAJUMDAR1
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
Darshan Ambhaikar
 
Sentiment analysis - Our approach and use cases
Sentiment analysis - Our approach and use casesSentiment analysis - Our approach and use cases
Sentiment analysis - Our approach and use cases
Karol Chlasta
 
Detecting Fake News Through NLP
Detecting Fake News Through NLPDetecting Fake News Through NLP
Detecting Fake News Through NLP
Sakha Global
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
Ashish Arora
 
Fake News Detection using Machine Learning
Fake News Detection using Machine LearningFake News Detection using Machine Learning
Fake News Detection using Machine Learning
ijtsrd
 
Sentiment Analysis using Twitter Data
Sentiment Analysis using Twitter DataSentiment Analysis using Twitter Data
Sentiment Analysis using Twitter Data
Hari Prasad
 
Text classification & sentiment analysis
Text classification & sentiment analysisText classification & sentiment analysis
Text classification & sentiment analysis
M. Atif Qureshi
 
Sentiment Analysis in Twitter
Sentiment Analysis in TwitterSentiment Analysis in Twitter
Sentiment Analysis in Twitter
Ayushi Dalmia
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
 
Machine Learning for Disease Prediction
Machine Learning for Disease PredictionMachine Learning for Disease Prediction
Machine Learning for Disease Prediction
Mustafa Oğuz
 
Final spam-e-mail-detection
Final  spam-e-mail-detectionFinal  spam-e-mail-detection
Final spam-e-mail-detection
Partnered Health
 
Twitter sentiment analysis ppt
Twitter sentiment analysis pptTwitter sentiment analysis ppt
Twitter sentiment analysis ppt
SonuCreation
 
Loan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptxLoan Prediction System Using Machine Learning.pptx
Loan Prediction System Using Machine Learning.pptx
BhoirRitesh19ET5008
 
Fake news detection
Fake news detection Fake news detection
Fake news detection
shalushamil
 
Project on disease prediction
Project on disease predictionProject on disease prediction
Project on disease prediction
KOYELMAJUMDAR1
 
Sentiment analysis - Our approach and use cases
Sentiment analysis - Our approach and use casesSentiment analysis - Our approach and use cases
Sentiment analysis - Our approach and use cases
Karol Chlasta
 

Similar to Fake news detection project (20)

CYBERGUARD:FAKE PROFILE DETECTION USING MACHINE LEARNING
CYBERGUARD:FAKE PROFILE DETECTION USING MACHINE LEARNINGCYBERGUARD:FAKE PROFILE DETECTION USING MACHINE LEARNING
CYBERGUARD:FAKE PROFILE DETECTION USING MACHINE LEARNING
IJNSA Journal
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
Kamoru Abiodun Balogun(Bsc,MIT,CCNA,OCA,PhD inview UPM)
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
ElmeBaje
 
Disadvantages of Social Media on Hiring Decisions Melissa Black, .docx
Disadvantages of Social Media on Hiring Decisions  Melissa Black, .docxDisadvantages of Social Media on Hiring Decisions  Melissa Black, .docx
Disadvantages of Social Media on Hiring Decisions Melissa Black, .docx
lynettearnold46882
 
762019109
762019109762019109
762019109
IJRAT
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
Lisa Muthukumar
 
sih_ppt2.pptx
sih_ppt2.pptxsih_ppt2.pptx
sih_ppt2.pptx
KartikeySahu7
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Michelle Ferrier
 
Social engineering
Social engineeringSocial engineering
Social engineering
n|u - The Open Security Community
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
E.S.G. JR. Consulting, Inc.
 
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine LearningFake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learning
classic tpr
 
Social Media and Recruiting
Social Media and RecruitingSocial Media and Recruiting
Social Media and Recruiting
Amber Wherry
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA
Surender Singh
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
andygustafson
 
Presentation on data privacy group 5
Presentation on data privacy   group 5Presentation on data privacy   group 5
Presentation on data privacy group 5
Carla Garcia Font
 
Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help
Bernard Marr
 
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
PierantonioAzzalini
 
Twitter Based Sentiment Analysis of Each Presidential Candidate Using Long Sh...
Twitter Based Sentiment Analysis of Each Presidential Candidate Using Long Sh...Twitter Based Sentiment Analysis of Each Presidential Candidate Using Long Sh...
Twitter Based Sentiment Analysis of Each Presidential Candidate Using Long Sh...
CSCJournals
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Elizabeth Dimit
 
CYBERGUARD:FAKE PROFILE DETECTION USING MACHINE LEARNING
CYBERGUARD:FAKE PROFILE DETECTION USING MACHINE LEARNINGCYBERGUARD:FAKE PROFILE DETECTION USING MACHINE LEARNING
CYBERGUARD:FAKE PROFILE DETECTION USING MACHINE LEARNING
IJNSA Journal
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
ElmeBaje
 
Disadvantages of Social Media on Hiring Decisions Melissa Black, .docx
Disadvantages of Social Media on Hiring Decisions  Melissa Black, .docxDisadvantages of Social Media on Hiring Decisions  Melissa Black, .docx
Disadvantages of Social Media on Hiring Decisions Melissa Black, .docx
lynettearnold46882
 
762019109
762019109762019109
762019109
IJRAT
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
Lisa Muthukumar
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Michelle Ferrier
 
Fake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine LearningFake News Detection on Social Media using Machine Learning
Fake News Detection on Social Media using Machine Learning
classic tpr
 
Social Media and Recruiting
Social Media and RecruitingSocial Media and Recruiting
Social Media and Recruiting
Amber Wherry
 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA
Surender Singh
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
andygustafson
 
Presentation on data privacy group 5
Presentation on data privacy   group 5Presentation on data privacy   group 5
Presentation on data privacy group 5
Carla Garcia Font
 
Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help Fake news is rampant, here is how artificial intelligence can help
Fake news is rampant, here is how artificial intelligence can help
Bernard Marr
 
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
PierantonioAzzalini
 
Twitter Based Sentiment Analysis of Each Presidential Candidate Using Long Sh...
Twitter Based Sentiment Analysis of Each Presidential Candidate Using Long Sh...Twitter Based Sentiment Analysis of Each Presidential Candidate Using Long Sh...
Twitter Based Sentiment Analysis of Each Presidential Candidate Using Long Sh...
CSCJournals
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Elizabeth Dimit
 
Ad

Recently uploaded (20)

Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Ad

Fake news detection project

  • 1. FAKE NEWS DETECTION Harshda Ghai, Suncity School Pragya Singhal, The Shri Ram School Aravali Ananya Grover, Amity International School, Noida
  • 2. How many of you receive forwarded news on Whatsapp?
  • 3. How many of you verify each and every piece of news you read before believing it?
  • 4. Research shows that 1 in 2 Indians receives fake news via Whatsapp and Facebook As per a survey by Social Media Matters and Institute for Governance, Policies and Politics SO WHY IS IDENTIFYING FAKE NEWS IMPORTANT? Because when we don’t, we can be fooled or manipulated- into worsening existing stereotypes, getting worried about fake disease epidemics, or even influencing whom we vote for.
  • 6. How we set up our problem and data ● We input the domain names, HTML codes, and labels (0- true, 1-fake) of 2002 news websites to train the model. ● Then we used 309 examples to test it. The output were labels of either 0 or 1 i.e. real or fake. Under the broad domain on ‘Natural Language Processing’, we used different approaches like keyword search, Bag of Words, and GloVe. ‘Vectors’ of words
  • 7. Our best modelA combination of bag-of-words, word-2-vector, and the feature description model was found to be the one which showed us maximum accuracy. ● BAG OF WORDS- looks at the count of each word. ● WORD-2-VEC-finds out the actual meaning of the world ● FEATURE DESCRIPTION- looking at the ‘url’, and the ‘html’ to infer the difference fake and real news.
  • 9. To improve: ● Instead of using only 16 features, we changed to using 616 features in our word-2-vec model, which was one of the key factors for improving our accuracy ● Using controversial words which were seen to appear more in fake news than in real. Eg. bombing, terrorist, Trump
  • 11. Real-World Applications 1) Elections 2) Fake job rackets 3) Checking the credibility of news links received on Whatsapp , Facebook , Twitter 4) Fake medical news messages
  • 12. Case Study-Job rackets Fishing at reputed job portals: Another way of conning job aspirants is through reputed job portals where racketeers fish for personal details of job seekers and exploit them later. "They build a database of critical personal information of unsuspecting candidates which can be dangerously misused at a later point,” says Chakraborty. In June, police arrested three men from Kavi Nagar in Ghaziabad for allegedly cheating several job seekers of around Rs 3.5 crore in the last two years. The mastermind of the racket posed on Naukri.com as representative of fictitious companies such as Idea International and Entomace Technology India Pvt Ltd and posted jobs. He would collect personal data of candidates who applied to those jobs. Later, he would send them fake interview letters from big, well-known companies. He wanted the candidates to pay through Paytm for fixing the interviews so they would get those jobs.
  • 13. Real-World Implementation To implement this in real life, we can make a mobile app or a Whatsapp-integrated feature. Users would simply enter the link of a news website and be able to verify whether a news website is true or fake. In the future, our improved model could also consider individual news stories and not just the news website as a whole.
  • 14. Acknowledgements Inspirit AI – Dehli Instructors: Tyler Bonnen, B.S. Sehj Kashyap, B.S. Artem Trotsyuk, B.S. Peter Washington, B.S., M.S. Nisheeth Ranjan, B.S., M.S. Debajyoti Datta, B.S., M.S. The Shri Ram School, Aravali Family and Friends