Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis

被引:49
|
作者
Yan, Ruidong [1 ]
Li, Deying [1 ]
Wu, Weili [2 ]
Du, Ding-Zhu [2 ]
Wang, Yongcai [1 ]
机构
[1] Rennain Univ China, Sch Informat, Beijing 100872, Peoples R China
[2] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75080 USA
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2020年 / 7卷 / 03期
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Social networking (online); Heuristic algorithms; Integrated circuit modeling; Greedy algorithms; Approximation algorithms; Dynamic programming; Social network; rumor blocking; submodularity; greedy algorithm; dynamic programming; PROPAGATION;
D O I
10.1109/TNSE.2019.2903272
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Online social networks, such as Facebook, Twitter, and Wechat have become major social tools. The users can not only keep in touch with family and friends, but also send and share the instant information. However, in some practical scenarios, we need to take effective measures to control the negative information spreading, e.g., rumors spread over the networks. In this paper, we first propose the minimizing influence of rumors (MIR) problem, i.e., selecting a blocker set B with k nodes such that the users' total activation probability by rumor source set S is minimized. Then, we employ the classical independent cascade (IC) model as an information diffusion model. Based on the IC model, we prove that the objective function is monotone decreasing and non-submodular. To address the MIR problem effectively, we propose a two-stages method generating candidate set and selecting blockers for the general networks. Furthermore, we also study the MIR problem on the tree network and propose a dynamic programming guaranteeing the optimal solution. Finally, we evaluate proposed algorithms by simulations on synthetic and real-life social networks, respectively. Experimental results show our algorithms are superior to the comparative heuristic approaches, such as out-degree, betweenness centrality, and PageRank.
引用
收藏
页码:1067 / 1078
页数:12
相关论文
共 50 条
  • [41] Fair-Aware Competitive Event Influence Maximization in Social Networks
    Gao, Siyuan
    Zhang, Zhongbao
    Su, Sen
    Wen, Jian
    Sun, Li
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04): : 2528 - 2540
  • [42] Trust inference algorithms for social networks
    Faisal, Maha
    Alsumait, Asmaa
    Al-Ameer, Zainab
    JOURNAL OF ENGINEERING RESEARCH, 2014, 2 (02): : 29 - 48
  • [43] Research on the Influence Maximization Problem in Social Networks Based on the Multi-Functional Complex Networks Model
    Bin, Sheng
    Sun, Gengxin
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2022, 34 (03)
  • [44] Evangelism in social networks: Algorithms and complexity
    Cordasco, Gennaro
    Gargano, Luisa
    Rescigno, Adele Anna
    Vaccaro, Ugo
    NETWORKS, 2018, 71 (04) : 346 - 357
  • [45] Minimizing the expected complete influence time of a social network
    Ni, Yaodong
    Xie, Lei
    Liu, Zhi-Qiang
    INFORMATION SCIENCES, 2010, 180 (13) : 2514 - 2527
  • [46] Using swarm intelligence algorithms to detect influential individuals for influence maximization in social networks
    Simsek, Aybike
    Kara, Resul
    EXPERT SYSTEMS WITH APPLICATIONS, 2018, 114 : 224 - 236
  • [47] Applications of Advanced Analysis Technologies in Precise Governance of Social Media Rumors
    Du, Xinyu
    Ou, Limei
    Zhao, Ye
    Zhang, Qi
    Li, Zongmin
    APPLIED SCIENCES-BASEL, 2021, 11 (15):
  • [48] Collective Influence Maximization in Mobile Social Networks
    Wu, Xudong
    Fu, Luoyi
    Wang, Shuaiqi
    Jiang, Bo
    Wang, Xinbing
    Chen, Guihai
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (02) : 797 - 812
  • [49] A note on maximizing the spread of influence in social networks
    Even-Dar, Eyal
    Shapira, Asaf
    INFORMATION PROCESSING LETTERS, 2011, 111 (04) : 184 - 187
  • [50] Containment of competitive influence spread in social networks
    Liu, Weiyi
    Yue, Kun
    Wu, Hong
    Li, Jin
    Liu, Donghua
    Tang, Duanping
    KNOWLEDGE-BASED SYSTEMS, 2016, 109 : 266 - 275