Computer Science ›› 2023, Vol. 50 ›› Issue (4): 22-31.doi: 10.11896/jsjkx.220200037

• Database & Big Data & Data Science • Previous Articles     Next Articles

Dual-attention Network Model on Propagation Tree Structures for Rumor Detection

HAN Xueming1,2, JIA Caiyan1,2, LI Xuanya3, ZHANG Pengfei1,2   

  1. 1 School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China
    2 Beijing Key Lab of Traffic Data Analysis and Mining,Beijing Jiaotong University,Beijing 100044,China
    3 Baidu Online Network Technology(Beijing)Co.,Ltd.,Beijing 100085,China
  • Received:2022-02-08 Revised:2022-05-12 Online:2023-04-15 Published:2023-04-06
  • About author:HAN Xueming,born in 1998,postgra-duate.His main research interests include natural language processing and rumor detection.
    JIA Caiyan,born in 1976,Ph.D,professor.Her main research interests include data mining,social computing and natural language processing.
  • Supported by:
    National Key R&D Program of China(2017YFC1703506),National Natural Science Foundation of China(61876016),Fundamental Research Funds for the Central Universities(2019JBZll0) and Open Research Fund of Baidu Pinecone Program.

Abstract: With the rapid development of social media and the popularity of mobile devices,the interaction between users has become more convenient.But at the same time,rumors on social media are more and more rampant,which brings hidden dangers to the public and social safety.In the real world,users often express their own opinions after observing other microblogs that have been posted,especially the context of the microblog to be replied.Although some existing rumor detection methods learn the propagation patterns on propagation trees of rumors to extract clues of user interrogation or factual evidences based on the principle of crowd wisdom,which greatly improves the performance of rumor detection,they only focus on those microblogs that have direct response relationships,and Lack of ability to fully mine the indirect and implicit relationships among microblogs in the process of rumor propagation.Therefore,in this paper,a node and path dual-attention network on propagation tree structures(DAN-Tree) for debunking rumors is proposed.First,the model uses the Transformer structure to fully learn the implicit semantic relationship between posts in the propagation path,and then uses the attention mechanism to perform weighted fusion to obtain the feature vector of the propagation path.Secondly,the path representation is weighted and aggregated by using the attention mechanism to obtain the representation vector of the whole propagation tree.In addition,the structure embedding method is used to learn the spatial location information of the post on the propagation tree,which realizes the effective fusion of the deep structure and semantic information in the rumor propagation structure.The effect of the DAN-Tree model is verified on four classic datasets.Experimental results show that the DAN-Tree model surpasses the best results of the existing literature on the three datasets:the accuracy of the Twitter15 and Twitter16 datasets increases by 1.81% and 2.39%,respectively,and the F1 score of the PHEME dataset increases by 7.51%,which proves the effectiveness of DAN-Tree model.

Key words: Rumor detection, Propagation structure, Attention mechanism, Social media, Deep learning

CLC Number: 

  • TP181
[1]CHEN Y F,LI Z Y,LIANG X,et al.Review onrumor detection of online social networks[J].Chinese Journal of Computers,2018,41(7):1648-1676.
[2]ZUBIAGA A,AKER A,BONTCHEVA K,et al.Detection and resolution of rumours in social media:a survey[J].ACM Computing Surveys,2018,51(2):1-36.
[3]MA J,GAO W,WONG K F.Detect rumors in microblog posts using propagation structure via kernel learning[C]//Procee-dings of the 55th Annual Meeting of the Association for Computational Linguistics.Stroudsburg:ACL,2017:708-717.
[4]WU K,YANG S,ZHU K Q.False rumors detection on sinaweibo by propagation structures[C]//Proceedings of the 31st IEEE International Conference on Data Engineering.New York:IEEE,2015:651-662.
[5]MA J,GAO W,WONG K F.Rumor detection on twitter with tree-structured recursive neural networks[C]//Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics.Stroudsburg,PA:ACL,2018:1980-1989.
[6]BIAN T,XIAO X,XU T Y,et al.Rumor detection on social media with bi-directional graph convolutional networks[C]//Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence.Menlo Park,CA:AAAI,2020:549-556.
[7]VASWANI A,SHAZEER N,PARMAR N,et al.Attention isall you need[C]//Proceedings of the 31st International Confe-rence on Neural Information Processing Systems.New York:Curran Associates,2017:6000-6010.
[8]NGUYEN X P,JOTY S,HOI A,et al.Tree-structured attention with hierarchical accumulation[C]//Proceedings of the 8th International Conference on Learning,2020.
[9]DAI Z H,YANG Z L,YANG Y M,et al.Transformer-xl:attentive language models beyond a fixed-length context[C]//Proceedings of the 57th Conference of the Association for Computational Linguistics.Stroudsburg,PA:ACL,2019:2978-2988.
[10]RAFFEL C,SHAZEER N,ROBERTS A,et al.Exploring the limits of transfer learning with a unified text-to-text transformer[J].Journal of Machine Learning Research,2020,21:1-67.
[11]KHOO L M S,CHIEU H L,QIAN Z,et al.Interpretable rumor detection in microblogs by attending to user interactions[C]//Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence.Menlo Park,CA:AAAI,2020:8783-8790.
[12]ZHAO Z,RESNICK P,MEI Q Z.Enquiring minds:early detection of rumors in social media from enquiry posts[C]//Procee-dings of the 24th International Conference on World Wide Web.New York:ACM,2015:1395-1405.
[13]CASTILLO C,MENDOZA M,POBLETE B.Information credibility on twitter[C]//Proceedings of the 20th International Conference on World Wide Web.New York:ACM,2011:675-684.
[14]KWON S,CHA M,JUNG K.Prominent features of rumorpropagation in online social media[C]//Proceedings of the 13th International Conference on Data Mining.New York:IEEE,2013:1103-1108.
[15]MA J,GAO W,WEI Z Y,et al.Detect rumors using time series of social contextinformation on microblogging websites[C]//Proceedings of the 24th ACM International Conference on Information and Knowledge Management.New York:ACM,2015:1751-1754.
[16]YANG F,YU X H,LIU Y,et al.Automatic detection of rumor on sina weibo[C]//Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics.New York:ACM,2012:1-7.
[17]LIAO X W,HUANG Z,YANG D D,et al.Rumor detection in social media based on a hierarchical attention network[J].SCIENTIA SINICA Informationis,2018,48:1558-1574.
[18]MA J,GAO W,MITRA P,et al.Detecting rumors from microblogs with recurrent neural networks[C]//Proceedings of the 25th International Joint Conference on Artificial Intelligence.Menlo Park,CA:AAAI,2016:3818-3824.
[19]YU F,LIU Q,WU S,et al.A convolutional approach for misinformation identification[C]//Proceedings of the Twenty-Sixth International Joint Conference on Artificial,2017:3901-3907.
[20]LIU Y,WU Y F B.Early detection of fake news on social media through propagation path classification with recurrent and con-volutional networks[C]//Proceedings of the Thirty-second AAAI Conference on Artificial Intelligence.Palo Alto,CA:AAAI,2018:354-361.
[21]GUO H,CAO J,ZHANG Y Z,et al.Rumor detection with hie-rarchical social attention network[C]//Proceedings of the 27th ACM International Conference on Information and Knowledge Management.New York:ACM,2018:943-951.
[22]YUAN C Y,MA Q W,ZHOU W,et al.Jointly embedding the local and global relations of heterogeneous graph for rumor detection[C]//Proceedings of the 2019 IEEE International Confe-rence on Data Mining(ICDM).New York:IEEE,2019:796-805.
[23]KUMAR S,CARLEY K M.Tree lstms with convolution unitsto predict stance and rumor veracity in social media conversations[C]//Proceedings of the 57th Conference of the Association for Computational Linguistics.Stroudsburg,PA:ACL,2019:5047-5058.
[24]MA J,GAO W,JOTY S R,et al.An attention-based rumor detection model with tree-structured recursiveneural networks[J].ACM Transactions on Intelligent Systems and Technology(TIST),2020,11(4):1-28.
[25]MA J,GAO W.Debunking rumors on twitter with tree transformer[C]//Proceedings of the 28th International Conference on Computational Linguistics.ICCL,2020:5455-5466.
[26]DEVLIN J,CHANG M W,LEE K,et al.Bert:pre-training of deep bidirectional transformers for language understanding[C]//Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics:Human Language Technologies.Stroudsburg,PA:ACL,2019:4171-4186.
[27]YANG L,WANG P,LI H,et al.A holistic representationguided attention network for scene text recognition[J].Neurocomputing,2020,414:67-75.
[28]YU D L,LI X,ZHANG C Q,et al.Towards accurate scene textrecognition with semantic reasoning networks[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Piscataway,NJ:IEEE,2020:12110-12119.
[29]KINGMA D P,BA J.Adam:a method for stochastic optimization[C]//Proceedings of the 3rd International Conference on Learning Representations.2015.
[30]ZUBIAGA A,LIAKATA M,PROCTER R,et al.Analysinghow people orient to and spread rumours in social media by looking at conversational threads[J].PloS one,2016,11(3):e0150989.
[31]DUCHI J,HAZAN E,SINGER Y.Adaptive subgradient me-thods for online learning and stochastic optimization[J].Journal of Machine Learning Research,2011,12(7):2121-2159.
[1] LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322.
[2] YU Xingzhan, LU Tianliang, DU Yanhui, WANG Xirui, YANG Cheng. Android Malware Family Classification Method Based on Synthetic Image and Xception Improved Model [J]. Computer Science, 2023, 50(4): 351-358.
[3] XUE Fenghao, JIANG Haibo, TANG Dan. Review of Deep Learning Applications in Healthcare [J]. Computer Science, 2023, 50(4): 1-15.
[4] YIN Heng, ZHANG Fan, LI Tianrui. Short-time Traffic Flow Forecasting Based on Multi-adjacent Graph and Multi-head Attention Mechanism [J]. Computer Science, 2023, 50(4): 40-46.
[5] LUO Xiaohui, WU Yun, WANG Chenxing, YU Wenting. Sequential Recommendation Model Based on User’s Long and Short Term Preference [J]. Computer Science, 2023, 50(4): 47-55.
[6] WANG Yali, ZHANG Fan, YU Zeng, LI Tianrui. Aspect-level Sentiment Classification Based on Interactive Attention and Graph Convolutional Network [J]. Computer Science, 2023, 50(4): 196-203.
[7] ZHOU Mingqiang, DAI Kailang, WU Quanwang, ZHU Qingsheng. Attention-aware Multi-channel Graph Convolutional Rating Prediction Model for Heterogeneous Information Networks [J]. Computer Science, 2023, 50(3): 129-138.
[8] DONG Yongfeng, HUANG Gang, XUE Wanruo, LI Linhao. Graph Attention Deep Knowledge Tracing Model Integrated with IRT [J]. Computer Science, 2023, 50(3): 173-180.
[9] HUA Xiaofeng, FENG Na, YU Junqing, HE Yunfeng. Shooting Event Detection of Free Kick in Soccer Video Based on Rule Reasoning [J]. Computer Science, 2023, 50(3): 181-190.
[10] MEI Pengcheng, YANG Jibin, ZHANG Qiang, HUANG Xiang. Sound Event Joint Estimation Method Based on Three-dimension Convolution [J]. Computer Science, 2023, 50(3): 191-198.
[11] BAI Xuefei, MA Yanan, WANG Wenjian. Segmentation Method of Edge-guided Breast Ultrasound Images Based on Feature Fusion [J]. Computer Science, 2023, 50(3): 199-207.
[12] LIU Hang, PU Yuanyuan, LYU Dahua, ZHAO Zhengpeng, XU Dan, QIAN Wenhua. Polarized Self-attention Constrains Color Overflow in Automatic Coloring of Image [J]. Computer Science, 2023, 50(3): 208-215.
[13] CHEN Liang, WANG Lu, LI Shengchun, LIU Changhong. Study on Visual Dashboard Generation Technology Based on Deep Learning [J]. Computer Science, 2023, 50(3): 238-245.
[14] ZHANG Yi, WU Qin. Crowd Counting Network Based on Feature Enhancement Loss and Foreground Attention [J]. Computer Science, 2023, 50(3): 246-253.
[15] YING Zonghao, WU Bin. Backdoor Attack on Deep Learning Models:A Survey [J]. Computer Science, 2023, 50(3): 333-350.
Full text



No Suggested Reading articles found!