C. Boididou, S. Middleton, S. Papadopoulos, D. Dang-nguyen, M. Riegler et al.,

, The VMU participation @ verifying multimedia use 2016, Mediaeval 2016 workshop

C. Boididou, S. Papadopoulos, D. Dang-nguyen, G. Boato, M. Riegler et al., Verifying multimedia use at mediaeval 2016, Mediaeval 2016 workshop, 2016.

L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone, Classification and regression trees, 1984.

J. Cao, Z. Jin, Y. Zhang, and Y. Zhang, Mcg-ict at mediaeval 2016: Verifying tweets from both text and visual content, Workshop, 2016.

G. L. Ciampaglia, P. Shiralkar, L. M. Rocha, J. Bollen, F. Menczer et al., Computational fact checking from knowledge networks, 2015.

V. Claveau and C. Raymond, IRISA at DeFT2017 : classification systems of increasing complexity, DeFT 2017 -Défi Fouille de texte, pp.1-10, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01643993

T. Declerck and P. Lendvai, Processing and normalizing hashtags, Recent Advances in Natural Language Processing, pp.104-109, 2015.

, Détection de fausses informations 25

L. Derczynski, D. Maynard, G. Rizzo, M. Erp, . Van et al., Analysis of named entity recognition and linking for tweets, Information Processing & Management, vol.51, issue.2, pp.32-49, 2015.
DOI : 10.1016/j.ipm.2014.10.006

M. V. Foteini, B. Patras, and . Ioannis, Online multi-task learning for semantic concept detection in video, Image processing (icip), 2016 IEEE international conference on, pp.186-190, 2016.

J. Golbeck and J. Hendler, Inferring binary trust relationships in Web-based social networks, ACM Transactions on Internet Technology, vol.6, issue.4, pp.497-529, 2006.
DOI : 10.1145/1183463.1183470

M. Goljan, J. Fridrich, and M. Chen, Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification, IEEE Transactions on Information Forensics and Security, vol.6, issue.1, pp.227-236, 2011.
DOI : 10.1109/TIFS.2010.2099220

T. Gottron, J. Schmitz, and S. Middleton, Focused exploration of geospatial context on linked open data, 3rd international conference on intelligent exploration of semantic data (ICIESD), 2014.

M. Gupta, P. Zhao, and J. Han, Evaluating Event Credibility on Twitter, 2012 SIAM International Conference on data mining, pp.153-164, 2012.
DOI : 10.1137/1.9781611972825.14

N. Hassan, C. Li, and M. Tremayne, Detecting Check-worthy Factual Claims in Presidential Debates, Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, CIKM '15, pp.1835-1838, 2015.
DOI : 10.14778/2732286.2732295

F. Jin, E. Dougherty, P. Saraf, Y. Cao, and N. Ramakrishnan, Epidemiological modeling of news and rumors on Twitter, Proceedings of the 7th Workshop on Social Network Mining and Analysis, SNAKDD '13, p.8, 2013.
DOI : 10.1145/2501025.2501027

W. Li, Y. Yuan, and N. Yu, Passive detection of doctored JPEG image via block artifact grid extraction, 89th Signal Processing, pp.1821-1829, 2009.
DOI : 10.1016/j.sigpro.2009.03.025

C. Maigrot, E. Kijak, R. Sicre, and V. Claveau, Tampering detection and localization in images from social networks: A CBIR approach In Image analysis and processing -ICIAP 2017 -19th international conference, catania, italy, september 11-15, 2017, proceedings, part I Consulté sur https, pp.750-761978, 2017.

S. Middleton, Extracting attributed verification and debunking reports from social media: mediaeval-2015 trust and credibility analysis of image and video, Workshop, 2015.

S. Middleton, Reveal project-trust and credibility analysis, 2015.

L. Page, S. Brin, R. Motwani, and T. Winograd, The pagerank citation ranking: bringing order to the web, 1999.

C. Pasquini, F. Pérez-gonzález, and G. Boato, A Benford-Fourier JPEG compression detector, 2014 IEEE International Conference on Image Processing (ICIP), pp.5322-5326, 2014.
DOI : 10.1109/ICIP.2014.7026077

Q. Phan, A. Budroni, C. Pasquini, D. Natale, and F. , A hybrid approach for multimedia use verification, Mediaeval 2016 workshop, 2016.

S. E. Robertson, S. Walker, and M. Hancock-beaulieu, Okapi at TREC-7: Automatic Ad Hoc, Filtering, VLC and Interactive, 7th text retrieval conference (trec), pp.253-264, 1998.

D. , , pp.2-3, 2017.

C. Silverman, Verification handbook: An ultimate guideline on digital age sourcing for emergency coverage, The European Journalism Centre (EJC), 2014.

K. Simonyan and A. Zisserman, Very deep convolutional networks for large-scale image recognition, Computing Research Repository (CRR), 2014.

G. Tolias, R. Sicre, and H. Jégou, Particular object retrieval with integral max-pooling of cnn activations, 4th international conference on learning representations, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01842218

S. Vosoughi, Automatic detection and verification of rumors on twitter, Thèse de doctorat non publiée, 2015.

J. Wan, D. Wang, S. C. Hoi, P. Wu, J. Zhu et al., Deep learning for contentbased image retrieval: A comprehensive study, 22nd ACM international conference on multimedia (icm), pp.157-166, 2014.
DOI : 10.1145/2647868.2654948

S. Wang and T. Terano, Detecting rumor patterns in streaming social media, 2015 IEEE International Conference on Big Data (Big Data), pp.2709-2715, 2015.
DOI : 10.1109/BigData.2015.7364071

M. Zampoglou, S. Papadopoulos, and Y. Kompatsiaris, Detecting image splicing in the wild (WEB), 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pp.1-6, 2015.
DOI : 10.1109/ICMEW.2015.7169839

A. Zubiaga, M. Liakata, R. Procter, K. Bontcheva, and P. Tolmie, Towards detecting rumours in social media, 2015.