Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3014812.3014813acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
research-article

Rumor restraining based on propagation prediction with limited observations in large-scale social networks

Published: 31 January 2017 Publication History

Abstract

In order to minimize the negative effect of malicious rumors in large-scale OSNs (Online Social Networks), researchers have proposed numerous solutions, such as controlling important user nodes and controlling bridges of social communities. However, these methods rarely take the space-time dynamic of rumor propagation into consideration. The selected controlled user nodes or bridges may be unable to influence the propagation process actually at current time if they are far from the rumor source or they have already undergone the rumor before. In the above mentioned two scenarios, it will be meaningless to control so-called important users and community bridges. In our work, we aim to restrain the rumor by predicting propagation dynamic from the microscopic perspective and collecting the boundary users who are most likely to be contagious at the moment. Moreover, to predict rumor's propagation dynamic practicably and efficiently, we adopt the sensor observation and meanwhile assume that there exist some short propagation paths which are explicit. We experimentally demonstrate that the proposed microscopic model's estimations rather accurately predict the propagation dynamic of the rumor. Moreover, the proposed rumor restraining method outperforms evidently classic Degree Centrality and Target Immunization approaches regarding the immunity scale and the immunity speed.

References

[1]
Dunbar R I M, Arnaboldi V, and Conti M. The structure of online social networks mirrors those in the offline world. Social Networks, 43:39--47, 2015.
[2]
Guille A, Hacid H, and Favre C. Information diffusion in online social networks: A survey. ACM SIGMOD Record, 42(2):17--28, 2013.
[3]
S. Wen, M. S. Haghighi, C. Chen, Y. Xiang, W. Zhou, and W. Jia. A sword with two edges: Propagation studies on both positive and negative information in online social networks. IEEE Transactions on Computers, 64(3):640--653, March 2015.
[4]
S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang. Prominent features of rumor propagation in online social media. In 2013 IEEE 13th International Conference on Data Mining, pages 1103--1108, Dec 2013.
[5]
Yan G, Chen G, and Eidenbenz S. Malware propagation in online social networks: nature, dynamics, and defense implications. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pages 196--206, 2011.
[6]
S. Wen, W. Zhou, Y. Wang, W. Zhou, and Y. Xiang. Locating defense positions for thwarting the propagation of topological worms. IEEE Communications Letters, 16(4):560--563, April 2012.
[7]
N. P. Nguyen, Y. Xuan, and M. T. Thai. A novel method for worm containment on dynamic social networks. In MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, pages 2180--2185, Oct 2010.
[8]
F. Li, Y. Yang, and J. Wu. Cpmc: An efficient proximity malware coping scheme in smartphone-based mobile networks. In INFOCOM, 2010 Proceedings IEEE, pages 1--9, March 2010.
[9]
Nguyen N P, Dinh T N, and Tokala S. Overlapping communities in dynamic networks: their detection and mobile applications. In Proceedings of the 17th annual international conference on Mobile computing and networking, pages 85--96, 2011.
[10]
J. Jiang, S. Wen, S. Yu, Y. Xiang, and W. Zhou. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys Tutorials, PP(99):1--1, 2016.
[11]
Altarelli F, Braunstein A, and Dall'Asta L. Bayesian inference of epidemics on networks via belief propagation. Physical review letters, 122(11):118701, 2014.
[12]
Pinto P C, Thiran P, and Vetterli M. Locating the source of diffusion in large-scale networks. Physical review letters, 109(6):068702, 2012.
[13]
Cheng J J, Liu Y, and Shen B. An epidemic model of rumor diffusion in online social networks. Physica A: Statistical Mechanics and its Applications, 86(1):1--7, 2013.
[14]
T. Wang, W. Jia, G. Xing, and M. Li. Exploiting statistical mobility models for efficient wi-fi deployment. IEEE Transactions on Vehicular Technology, 62(1):360--373, Jan 2013.
[15]
Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. IEEE Communications Surveys Tutorials, 16(2):942--960, Second 2014.
[16]
Newman M. Networks: an introduction. Oxford university press, 2010.
[17]
C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on Dependable and Secure Computing, 4(2):105--118, April 2007.
[18]
S. Wen, J. Jiang, Y. Xiang, S. Yu, W. Zhou, and W. Jia. To shut them up or to clarify: Restraining the spread of rumors in online social networks. IEEE Transactions on Parallel and Distributed Systems, 25(12):3306--3316, Dec 2014.
[19]
Z. He, Z. Cai, and X. Wang. Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In Distributed Computing Systems (ICDCS), 2015 IEEE 35th International Conference on, pages 205--214, June 2015.
[20]
T Wang, Q Wu, S Wen, Y Cai, and Y Cheng. The inhibition and clearup of the mobile worm in wireless sensor networks. Journal of Electronics and Information Technology(J Electr Inf Technol), 38(9):2202--2207, 2016.
[21]
Gao C, Liu J, and Zhong N. Network immunization and virus propagation in email networks: experimental evaluation and analysis. Knowledge and information systems, 27(2):253--279, 2011.
[22]
Pastor-Satorras R, Castellano C, and Van Mieghem P. Epidemic processes in complex networks. Reviews of modern physics, 87(3):925, 2015.
[23]
S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, W. Jia, and C. C. Zou. Modeling and analysis on the propagation dynamics of modern email malware. IEEE Transactions on Dependable and Secure Computing, 11(4):361--374, July 2014.
[24]
Seo E, Mohapatra P, and Abdelzaher T. Identifying rumors and their sources in social networks. In SPIE defense, security, and sensing, International Society for Optics and Photonics, pages 83891I--83891I--13, 2012.
[25]
S. Vosoughi and D. Roy. A human-machine collaborative system for identifying rumors on twitter. In 2015 IEEE International Conference on Data Mining Workshop (ICDMW), pages 47--50, Nov 2015.
[26]
T. Wang, W. Jia, and P. Shen. Bluecat: An efficient way for relative mobile localization. In 2012 32nd International Conference on Distributed Computing Systems Workshops, pages 209--215, June 2012.

Cited By

View all
  • (2023)An Influence Spread Blocking Maximization Method based on Node Mixed Blocking Gain2023 4th International Conference on Computer, Big Data and Artificial Intelligence (ICCBD+AI)10.1109/ICCBD-AI62252.2023.00030(123-129)Online publication date: 15-Dec-2023
  • (2021)A novel rumor detection algorithm based on entity recognition, sentence reconfiguration, and ordinary differential equation networkNeurocomputing10.1016/j.neucom.2021.03.055447(224-234)Online publication date: Aug-2021
  • (2021)An automatic crisis information recognition model based on BP neural networksJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-03246-114:5(6201-6212)Online publication date: 2-Jun-2021
  • Show More Cited By

Index Terms

  1. Rumor restraining based on propagation prediction with limited observations in large-scale social networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ACSW '17: Proceedings of the Australasian Computer Science Week Multiconference
        January 2017
        615 pages
        ISBN:9781450347686
        DOI:10.1145/3014812
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 31 January 2017

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. boundary users
        2. online social networks
        3. propagation paths
        4. rumor restraining
        5. sensor observation

        Qualifiers

        • Research-article

        Conference

        ACSW 2017
        ACSW 2017: Australasian Computer Science Week 2017
        January 30 - February 3, 2017
        Geelong, Australia

        Acceptance Rates

        ACSW '17 Paper Acceptance Rate 78 of 156 submissions, 50%;
        Overall Acceptance Rate 204 of 424 submissions, 48%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)8
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 22 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)An Influence Spread Blocking Maximization Method based on Node Mixed Blocking Gain2023 4th International Conference on Computer, Big Data and Artificial Intelligence (ICCBD+AI)10.1109/ICCBD-AI62252.2023.00030(123-129)Online publication date: 15-Dec-2023
        • (2021)A novel rumor detection algorithm based on entity recognition, sentence reconfiguration, and ordinary differential equation networkNeurocomputing10.1016/j.neucom.2021.03.055447(224-234)Online publication date: Aug-2021
        • (2021)An automatic crisis information recognition model based on BP neural networksJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-03246-114:5(6201-6212)Online publication date: 2-Jun-2021
        • (2020)Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature MappingIEEE Access10.1109/ACCESS.2020.29946588(92929-92944)Online publication date: 2020
        • (2019)An Automatic Crisis Information Recognition Model Based on BP Neural Network2019 International Conference on Networking and Network Applications (NaNA)10.1109/NaNA.2019.00082(446-451)Online publication date: Oct-2019
        • (2019)A risk defense method based on microscopic state prediction with partial information observations in social networksJournal of Parallel and Distributed Computing10.1016/j.jpdc.2019.04.007131:C(189-199)Online publication date: 1-Sep-2019
        • (2019)Temporal Convolutional Networks for Popularity Prediction of Messages on Social MediasInformation Retrieval10.1007/978-3-030-31624-2_11(135-147)Online publication date: 18-Sep-2019
        • (2018)Adversarial Training Model Unifying Feature Driven and Point Process Perspectives for Event Popularity PredictionProceedings of the 27th ACM International Conference on Information and Knowledge Management10.1145/3269206.3271714(517-526)Online publication date: 17-Oct-2018
        • (2018)EPAB: Early Pattern Aware Bayesian Model for Social Content Popularity Prediction2018 IEEE International Conference on Data Mining (ICDM)10.1109/ICDM.2018.00175(1296-1301)Online publication date: Nov-2018

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media