Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 17-23.doi: 10.11896/JsJkx.190900086

• Artificial Intelligence • Previous Articles     Next Articles

False Message Propagation Suppression Based on Influence Maximization

CHEN Jin-yin, ZHANG Dun-Jie, LIN Xiang, XU Xiao-dong and ZHU Zi-ling   

  1. College of Information Engineering,ZheJiang University of Technology,Hangzhou 310000,China
  • Published:2020-07-07
  • About author:CHEN Jin-yin, Ph.D, associate, professor.Her research interests include evolutionary computing, data mining, and deep learning algorithm.
  • Supported by:
    This work was supported by the ZheJiang Provincial Natural Science Foundation of China (LY19F020025),MaJor Special Funding for “Science and Technology Innovation 2025” in Ningbo(2018B10063),and Engineering Research Center of Cognitive Healthcare of ZheJiang Province(2018KFJJ07).

Abstract: With the wide development of various social media,the security issues caused by news transmission in social networks are becoming increasingly prominent.Especially,the propagation of false messages brings great threat to the security of cyberspace.In order to effectively control the propagation of false messages in cyberspace,and change the network topology as little as possible to suppress the false messages propagation,this paper proposed a false message propagation suppression method based on influence maximization.Firstly,it predicts the message propagation based on information cascade prediction model and puts forward two algorithms named Louvain Clustered Local Degree Centrality and Random Maximum Degree (LCLD,RMD) based on the idea of node influence maximization,to obtain the most influential nodes set,then use TextCNN to classify the false messages and filter out a small number of key nodes in the nodes set that publish false messages.The modified propagation network re-predicts the message propagation by prediction model.It is found that the message propagation is significantly suppressed compared to the network without modification.Finally,the proposed method is verified on the BuzzFeedNews dataset.It is proved by experiments that the prediction model based on information cascade can fit the actual propagation more accurately,and the prediction results of the modified network input prediction model show that the false message propagation can be suppressed.Experimental results show that the influence maximization algorithms can effectively suppress the propagation of false messages by deleting a few nodes containing false messages,which verifies the effectiveness of the proposed method.

Key words: Deep learning, False message recognition, Influence maximization, Message propagation, Social network

CLC Number: 

  • TP391
[1] VOSOUGHI S,ROY D,ARAL S.The spread of true and false news online.Science,2018,359(6380):1146-1151.
[2] ZHANG W,YE Y Q,TAN H L,et al.Information diffusion model based on social network//Proceedings of the 2012 International Conference of Modern Computer Science and Applications.Berlin Heidelberg:Springer-Verlag,2013:145-150.
[3] LI C,MA J,GUO X,et al.Deepcas:An end-to-end predictor of information cascades//Proceedings of the 26th international conference on World Wide Web.International World Wide Web Conferences Steering Committee,Perth,2017:577-586.
[4] KIM S B,HAN K S,RIM H C,et al.Some effective techniques for naive bayes text classification.IEEE Transactions on Knowledge and Data Engineering,2006,18(11):1457-1466.
[5] GENKIN A,LEWIS D D,MADIGAN D.Large-scale Bayesian logistic regression for text categorization.Technometrics,2007,49(3):291-304.
[6] COLAS F,BRAZDIL P.Comparison of SVM and some older classification algorithms in text classification tasks//IFIP International Conference on Artificial Intelligence in Theory and Practice.Boston:Springer,2006:169-178.
[7] KIM Y.Convolutional neural networks for sentence classification.arXiv:1408.5882,2014.
[8] LIU P,QIU X,HUANG X.Recurrent neural network for text classification with multi-task learning.arXiv:1605.05101,2016.
[9] BAHDANAU D,CHO K,BENGIO Y.Neural machine translation by Jointly learning to align and translate.arXiv:1409.0473,2014.
[10] POTTHAST M,KIESEL J,REINARTZ K,et al.A stylometric inquiry into hyperpartisan and fake news.arXiv:1702.05638,2017.
[11] ZHENG M H,LV L Y,ZHAO M.Spreading in online social networks:the role ofsocial reinforcement.Physical Review E:Statistical Nonlinear and Soft Matter Physics,2013,88(1).
[12] ZAN Y L,WU J L,LI P,et al.SICR rumor spreading model in complex networks:counterattack and self-resistance.Physica A:Statistical Mechanics and Its Applications,2014,405(1):159-170.
[13] WANG X L,ZHAO L J.Rumor spreading model with skepticism mechanism in social networks.Journal of University of Shanghai for Science and Technology,2012,34(5):424-428.
[14] ZHANG Y M,TANG C S,Li W G.Research on interest attenuation and social reinforcement mechanism for rumor spreading in online social networks.Journal of the China Society for Scientific and Technical Information,2015,34(8):833-844.
[15] KAN J Q,XIE J R,ZHANG H F.Impacts of Social Reinforcement and Edge Weight on the Spreading of Information in Networks.Journal of University of Electronic Science and Technology of China,2014,43(1):21-25.
[16] JENDERS M,KASNECI G,NAUMANN F.Analyzing and predicting viral tweets//Proc.of WWW.2013:173-182
[17] CHENG J,ADAMIC L,DOW P A,et al.Can cascades be predicted//Proc.of WWW.2014:42-34.
[18] LERMAN K,GHOSH R.Information contagion:n empirical study of the spread of news on digg and twitter social networks//ICWSM.2010:54-32.
[19] YANG Y,TANG J,LEUNG C W K,et al.Rain:social role-aware information diffusion//Proc.of AAAI.2015:34-35.
[20] CHENG J,ADAMIC L,DOW P A,et al.Can cascades be predicted//Proc.of WWW.2014:43-55.
[21] MUKHERJEE A,VENKATARAMAN V,LIU B,et al.What yelp fake review filter might be doing?//Seventh International AAAI Conference on Weblogs and Social Media.Bellevue,2013.
[22] JING Y P.Reacher of deceptive opinions spam recognition based on deep learning.Shanghai:East China Normal University,2014.
[23] LI J,OTT M,CARDIE C,et al.Towards a general rule for identifying deceptive opinion spam//Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics.2014:1566-1576.
[24] LAU R Y K,LIAO S Y,KWOK R C W,et al.Text mining and probabilistic language modeling for online review spam detecting.ACM Transactions on Management Information Systems,2011,2(4):1-30.
[25] OTT M,CHOI Y,CARDIE C,et al. Finding deceptive opinion spam by any stretch of the imagination//Proceedings of the 49th annual meeting of the association for computational linguistics:Human language technologies.Association for Computational Linguistics,Oregon,2011:309-319.
[26] JINDAL N,LIU B,LIM E P.Finding unusual review patterns using unexpected rules//Proceedings of the 19th ACM International Conference on Information and Knowledge Management.ACM,Toronto,2010:1549-1552.
[27] JOULIN A,GRAVE E,BOJANOWSKI P,et al.Bag of Tricks for Efficient Text Classification.arXiv:1607.01759,2016.
[28] SUTSKEVERI,VINYALS O,LE Q V.Sequence to Sequence Learning with Neural Networks//Advances in Neural Information Processing Systems.2014.
[29] BAHDANAU D,CHO K,BENGIO Y.Neural Machine Translation by Jointly Learning to Align and Translate.arXiv:1409.0473.
[30] BLONDEL V D,GUILLAUME J L,LAMBIOTTE R,et al.Fast unfolding of communities in large networks.arXiv:0803.0476,2008.
[1] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[2] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[3] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[4] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[5] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[6] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[7] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[8] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
[9] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[10] SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235.
[11] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[12] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[13] WANG Jun-feng, LIU Fan, YANG Sai, LYU Tan-yue, CHEN Zhi-yu, XU Feng. Dam Crack Detection Based on Multi-source Transfer Learning [J]. Computer Science, 2022, 49(6A): 319-324.
[14] CHU Yu-chun, GONG Hang, Wang Xue-fang, LIU Pei-shun. Study on Knowledge Distillation of Target Detection Algorithm Based on YOLOv4 [J]. Computer Science, 2022, 49(6A): 337-344.
[15] LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!