计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 17-23.doi: 10.11896/JsJkx.190900086

• 人工智能 • 上一篇    下一篇

基于影响力最大化策略的抑制虚假消息传播的方法

陈晋音, 张敦杰, 林翔, 徐晓东, 朱子凌   

  1. 浙江工业大学信息工程学院 杭州 310000
  • 发布日期:2020-07-07
  • 通讯作者: 陈晋音(chenJinyin@zJut.edu.cn)
  • 基金资助:
    浙江省自然科学基金(LY19F020025);宁波市“科技创新2025”重大专项(2018B10063);浙江省认知医疗工程技术中心开放基金(2018KFJJ07)

False Message Propagation Suppression Based on Influence Maximization

CHEN Jin-yin, ZHANG Dun-Jie, LIN Xiang, XU Xiao-dong and ZHU Zi-ling   

  1. College of Information Engineering,ZheJiang University of Technology,Hangzhou 310000,China
  • Published:2020-07-07
  • About author:CHEN Jin-yin, Ph.D, associate, professor.Her research interests include evolutionary computing, data mining, and deep learning algorithm.
  • Supported by:
    This work was supported by the ZheJiang Provincial Natural Science Foundation of China (LY19F020025),MaJor Special Funding for “Science and Technology Innovation 2025” in Ningbo(2018B10063),and Engineering Research Center of Cognitive Healthcare of ZheJiang Province(2018KFJJ07).

摘要: 随着各种社交媒体不断兴起,社交网络中消息传播所带来的安全问题显得愈发突出。其中,虚假消息的传播给网络空间的安全带来了极大威胁。为了在尽可能小地改变网络拓扑结构的前提下抑制虚假消息在网络空间的肆意传播,提出了一种基于影响力最大化的抑制虚假消息传播的方法。首先基于信息级联预测模型对消息传播进行预测,提出基于节点影响力最大化思想的两种算法Louvain Clustered Local Degree Centrality(LCLD)和Random Maximum Degree(RMD),得到影响力最大的节点集合;然后利用TextCNN对虚假消息进行分类识别,过滤掉节点集合中的少量关键节点。修改后的传播网络重新通过预测模型进行消息传播预测,结果虚假消息的传播相比于网络修改前得到了明显抑制。最后在真实数据集BuzzFeedNews上展开验证,首先通过实验验证基于信息级联的预测模型可以较准确地拟合实际传播;再将修改后的网络输入预测模型进行预测,结果显示虚假消息传播可得到抑制,表明采用影响力最大化算法删减少量包含虚假消息的节点可有效抑制虚假消息的传播,从而验证了所提方法的有效性。

关键词: 社交网络, 深度学习, 消息传播, 虚假消息识别, 影响力最大化

Abstract: With the wide development of various social media,the security issues caused by news transmission in social networks are becoming increasingly prominent.Especially,the propagation of false messages brings great threat to the security of cyberspace.In order to effectively control the propagation of false messages in cyberspace,and change the network topology as little as possible to suppress the false messages propagation,this paper proposed a false message propagation suppression method based on influence maximization.Firstly,it predicts the message propagation based on information cascade prediction model and puts forward two algorithms named Louvain Clustered Local Degree Centrality and Random Maximum Degree (LCLD,RMD) based on the idea of node influence maximization,to obtain the most influential nodes set,then use TextCNN to classify the false messages and filter out a small number of key nodes in the nodes set that publish false messages.The modified propagation network re-predicts the message propagation by prediction model.It is found that the message propagation is significantly suppressed compared to the network without modification.Finally,the proposed method is verified on the BuzzFeedNews dataset.It is proved by experiments that the prediction model based on information cascade can fit the actual propagation more accurately,and the prediction results of the modified network input prediction model show that the false message propagation can be suppressed.Experimental results show that the influence maximization algorithms can effectively suppress the propagation of false messages by deleting a few nodes containing false messages,which verifies the effectiveness of the proposed method.

Key words: Deep learning, False message recognition, Influence maximization, Message propagation, Social network

中图分类号: 

  • TP391
[1] VOSOUGHI S,ROY D,ARAL S.The spread of true and false news online.Science,2018,359(6380):1146-1151.
[2] ZHANG W,YE Y Q,TAN H L,et al.Information diffusion model based on social network//Proceedings of the 2012 International Conference of Modern Computer Science and Applications.Berlin Heidelberg:Springer-Verlag,2013:145-150.
[3] LI C,MA J,GUO X,et al.Deepcas:An end-to-end predictor of information cascades//Proceedings of the 26th international conference on World Wide Web.International World Wide Web Conferences Steering Committee,Perth,2017:577-586.
[4] KIM S B,HAN K S,RIM H C,et al.Some effective techniques for naive bayes text classification.IEEE Transactions on Knowledge and Data Engineering,2006,18(11):1457-1466.
[5] GENKIN A,LEWIS D D,MADIGAN D.Large-scale Bayesian logistic regression for text categorization.Technometrics,2007,49(3):291-304.
[6] COLAS F,BRAZDIL P.Comparison of SVM and some older classification algorithms in text classification tasks//IFIP International Conference on Artificial Intelligence in Theory and Practice.Boston:Springer,2006:169-178.
[7] KIM Y.Convolutional neural networks for sentence classification.arXiv:1408.5882,2014.
[8] LIU P,QIU X,HUANG X.Recurrent neural network for text classification with multi-task learning.arXiv:1605.05101,2016.
[9] BAHDANAU D,CHO K,BENGIO Y.Neural machine translation by Jointly learning to align and translate.arXiv:1409.0473,2014.
[10] POTTHAST M,KIESEL J,REINARTZ K,et al.A stylometric inquiry into hyperpartisan and fake news.arXiv:1702.05638,2017.
[11] ZHENG M H,LV L Y,ZHAO M.Spreading in online social networks:the role ofsocial reinforcement.Physical Review E:Statistical Nonlinear and Soft Matter Physics,2013,88(1).
[12] ZAN Y L,WU J L,LI P,et al.SICR rumor spreading model in complex networks:counterattack and self-resistance.Physica A:Statistical Mechanics and Its Applications,2014,405(1):159-170.
[13] WANG X L,ZHAO L J.Rumor spreading model with skepticism mechanism in social networks.Journal of University of Shanghai for Science and Technology,2012,34(5):424-428.
[14] ZHANG Y M,TANG C S,Li W G.Research on interest attenuation and social reinforcement mechanism for rumor spreading in online social networks.Journal of the China Society for Scientific and Technical Information,2015,34(8):833-844.
[15] KAN J Q,XIE J R,ZHANG H F.Impacts of Social Reinforcement and Edge Weight on the Spreading of Information in Networks.Journal of University of Electronic Science and Technology of China,2014,43(1):21-25.
[16] JENDERS M,KASNECI G,NAUMANN F.Analyzing and predicting viral tweets//Proc.of WWW.2013:173-182
[17] CHENG J,ADAMIC L,DOW P A,et al.Can cascades be predicted//Proc.of WWW.2014:42-34.
[18] LERMAN K,GHOSH R.Information contagion:n empirical study of the spread of news on digg and twitter social networks//ICWSM.2010:54-32.
[19] YANG Y,TANG J,LEUNG C W K,et al.Rain:social role-aware information diffusion//Proc.of AAAI.2015:34-35.
[20] CHENG J,ADAMIC L,DOW P A,et al.Can cascades be predicted//Proc.of WWW.2014:43-55.
[21] MUKHERJEE A,VENKATARAMAN V,LIU B,et al.What yelp fake review filter might be doing?//Seventh International AAAI Conference on Weblogs and Social Media.Bellevue,2013.
[22] JING Y P.Reacher of deceptive opinions spam recognition based on deep learning.Shanghai:East China Normal University,2014.
[23] LI J,OTT M,CARDIE C,et al.Towards a general rule for identifying deceptive opinion spam//Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics.2014:1566-1576.
[24] LAU R Y K,LIAO S Y,KWOK R C W,et al.Text mining and probabilistic language modeling for online review spam detecting.ACM Transactions on Management Information Systems,2011,2(4):1-30.
[25] OTT M,CHOI Y,CARDIE C,et al. Finding deceptive opinion spam by any stretch of the imagination//Proceedings of the 49th annual meeting of the association for computational linguistics:Human language technologies.Association for Computational Linguistics,Oregon,2011:309-319.
[26] JINDAL N,LIU B,LIM E P.Finding unusual review patterns using unexpected rules//Proceedings of the 19th ACM International Conference on Information and Knowledge Management.ACM,Toronto,2010:1549-1552.
[27] JOULIN A,GRAVE E,BOJANOWSKI P,et al.Bag of Tricks for Efficient Text Classification.arXiv:1607.01759,2016.
[28] SUTSKEVERI,VINYALS O,LE Q V.Sequence to Sequence Learning with Neural Networks//Advances in Neural Information Processing Systems.2014.
[29] BAHDANAU D,CHO K,BENGIO Y.Neural Machine Translation by Jointly Learning to Align and Translate.arXiv:1409.0473.
[30] BLONDEL V D,GUILLAUME J L,LAMBIOTTE R,et al.Fast unfolding of communities in large networks.arXiv:0803.0476,2008.
[1] 饶志双, 贾真, 张凡, 李天瑞.
基于Key-Value关联记忆网络的知识图谱问答方法
Key-Value Relational Memory Networks for Question Answering over Knowledge Graph
计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277
[2] 孔世明, 冯永, 张嘉云.
融合知识图谱的多层次传承影响力计算与泛化研究
Multi-level Inheritance Influence Calculation and Generalization Based on Knowledge Graph
计算机科学, 2022, 49(9): 221-227. https://doi.org/10.11896/jsjkx.210700144
[3] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[4] 徐涌鑫, 赵俊峰, 王亚沙, 谢冰, 杨恺.
时序知识图谱表示学习
Temporal Knowledge Graph Representation Learning
计算机科学, 2022, 49(9): 162-171. https://doi.org/10.11896/jsjkx.220500204
[5] 王剑, 彭雨琦, 赵宇斐, 杨健.
基于深度学习的社交网络舆情信息抽取方法综述
Survey of Social Network Public Opinion Information Extraction Based on Deep Learning
计算机科学, 2022, 49(8): 279-293. https://doi.org/10.11896/jsjkx.220300099
[6] 郝志荣, 陈龙, 黄嘉成.
面向文本分类的类别区分式通用对抗攻击方法
Class Discriminative Universal Adversarial Attack for Text Classification
计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077
[7] 姜梦函, 李邵梅, 郑洪浩, 张建朋.
基于改进位置编码的谣言检测模型
Rumor Detection Model Based on Improved Position Embedding
计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046
[8] 孙奇, 吉根林, 张杰.
基于非局部注意力生成对抗网络的视频异常事件检测方法
Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection
计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061
[9] 胡艳羽, 赵龙, 董祥军.
一种用于癌症分类的两阶段深度特征选择提取算法
Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification
计算机科学, 2022, 49(7): 73-78. https://doi.org/10.11896/jsjkx.210500092
[10] 程成, 降爱莲.
基于多路径特征提取的实时语义分割方法
Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction
计算机科学, 2022, 49(7): 120-126. https://doi.org/10.11896/jsjkx.210500157
[11] 侯钰涛, 阿布都克力木·阿布力孜, 哈里旦木·阿布都克里木.
中文预训练模型研究进展
Advances in Chinese Pre-training Models
计算机科学, 2022, 49(7): 148-163. https://doi.org/10.11896/jsjkx.211200018
[12] 周慧, 施皓晨, 屠要峰, 黄圣君.
基于主动采样的深度鲁棒神经网络学习
Robust Deep Neural Network Learning Based on Active Sampling
计算机科学, 2022, 49(7): 164-169. https://doi.org/10.11896/jsjkx.210600044
[13] 苏丹宁, 曹桂涛, 王燕楠, 王宏, 任赫.
小样本雷达辐射源识别的深度学习方法综述
Survey of Deep Learning for Radar Emitter Identification Based on Small Sample
计算机科学, 2022, 49(7): 226-235. https://doi.org/10.11896/jsjkx.210600138
[14] 祝文韬, 兰先超, 罗唤霖, 岳彬, 汪洋.
改进Faster R-CNN的光学遥感飞机目标检测
Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN
计算机科学, 2022, 49(6A): 378-383. https://doi.org/10.11896/jsjkx.210300121
[15] 王建明, 陈响育, 杨自忠, 史晨阳, 张宇航, 钱正坤.
不同数据增强方法对模型识别精度的影响
Influence of Different Data Augmentation Methods on Model Recognition Accuracy
计算机科学, 2022, 49(6A): 418-423. https://doi.org/10.11896/jsjkx.210700210
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!