Precautionary rumor containment via trustworthy people in social networks

被引:5
作者
Fan, Lidan [1 ]
Wu, Weili [2 ]
Xing, Kai [2 ]
Lee, Wonjun [3 ]
机构
[1] Univ Kansas, Sch Business, 1450 Jayhawk Blvd, Lawrence, KS 66045 USA
[2] Univ Texas Dallas, Dept Comp Sci, 800 W Campbell Rd, Richardson, TX 75080 USA
[3] Korea Univ, Dept Comp Sci & Engn, 145 Anam Ro, Seoul, South Korea
基金
美国国家科学基金会;
关键词
Rumor; trust; social networks; social relation graph; Greedy Algorithm;
D O I
10.1142/S179383091650004X
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In a social network, rumor containment is vital, as the diffusion of a rumor will bring terrible results. Precautionary measure can be used to control rumor propagation: Anticipating the spread of a rumor, one can (1) select a set of trustworthy people (TP) in the network, (2) alert the TP about the rumor, and (3) ask the TP to protect their neighbors by sending out alerts. In this paper, we study the problem of how to select the least number of TP, satisfying the requirement that the entire network is protected by the alerts that the TP send. We propose an asymmetric trust (AT) information propagation model. Under this model, we study the Least Number TP Selection (LNTS) problem, establish its NP-hardness and reformulate it as a minimum submodular cover problem. As a result, the Greedy Algorithm is a constant-factor approximation algorithm. Using real-world data, we evaluate the performance of the Greedy Algorithm, and compare it with other algorithms. Experimental results indicate that the Greedy Algorithm performs the best among its competitors.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Soft rumor control in social networks: Modeling and analysis
    Askarizadeh, Mojgan
    Ladani, Behrouz Tork
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 100
  • [22] Modeling Rumor Spread and Influencer Impact on Social Networks
    Govindankutty, Sreeraag
    Padinjappurathu Gopalan, Shynu
    IEEE ACCESS, 2023, 11 : 121617 - 121628
  • [23] Rumor Spreading with Cross Propagation in Multilayer Social Networks
    Han, Qiyi
    Gu, Musong
    You, Lei
    Miao, Fang
    2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 1641 - 1645
  • [24] Hadoop Cellular Automata for Identifying Rumor in Social Networks
    Zhang, Hui
    Li, Ji
    Xiao, Yueliang
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 37 - 42
  • [25] Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks
    Liu, Guanfeng
    Wang, Yan
    Orgun, Mehmet A.
    Lim, Ee-Peng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2013, 6 (02) : 152 - 167
  • [26] Modeling Repeated Rumor Spreading in Coupled Social Networks
    Han, Qiyi
    Shi, Kaibo
    Gu, Musong
    You, Lei
    Miao, Fang
    IEEE ACCESS, 2021, 9 : 89732 - 89740
  • [27] An Implicit Crowdsourcing Approach to Rumor Identification in Online Social Networks
    Osho, Abiola
    Waters, Caden
    Amariucai, George
    2020 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2020, : 174 - +
  • [28] Rumor Spreading Model Considering Iterative Spread on Social Networks
    Han, Qiyi
    Miao, Fang
    You, Lei
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 1363 - 1367
  • [29] Containment of competitive influence spread in social networks
    Liu, Weiyi
    Yue, Kun
    Wu, Hong
    Li, Jin
    Liu, Donghua
    Tang, Duanping
    KNOWLEDGE-BASED SYSTEMS, 2016, 109 : 266 - 275
  • [30] A New Rumor Propagation Model and Control Strategy on Social Networks
    Bao, Yuanyuan
    Yi, Chengqi
    Xue, Yibo
    Dong, Yingfei
    2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2013, : 1472 - 1473