Rumor Initiator Detection in Infected Signed Networks

被引:4
作者
Zhang, Jiawei [1 ]
Aggarwal, Charu C. [2 ]
Yu, Philip S. [1 ,3 ]
机构
[1] Univ Illinois, Chicago, IL 60607 USA
[2] IBM TJ Watson Res Ctr, Yorktown Hts, NY USA
[3] Tsinghua Univ, Inst Data Sci, Beijing, Peoples R China
来源
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) | 2017年
关键词
Terms Rumor Initiator Detection; Information Diffusion; Signed Networks; Data Mining;
D O I
10.1109/ICDCS.2017.72
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In many cases, the information spread in an online network may not always be truthful or correct; such information corresponds to rumors. In recent years, signed networks have become increasingly popular because of their ability to represent diverse relationships such as friends, enemies, trust, and distrust. Signed networks are ideal for information flow in a network with varying beliefs (trust or distrust) about facts. In this paper, we will study the problem of influence analysis and diffusion models in signed networks and investigate the problem of rumor initiator detection, given the state of the network at a given moment in time. Conventional information diffusion models for unsigned networks cannot be applied to signed networks directly, and we show that the rumor initiator detection problem is NP-hard. We propose a new information diffusion model, referred to as asyMmetric Flipping Cascade (MFC), to model the propagation of information in signed networks. Based on MFC, a novel framework, Rumor Initiator Detector (RID), is introduced to determine the potential number and the identity of the rumor initiators from the state of the network at a given time. Extensive experiments conducted on real-world signed networks demonstrate that MFC works very well in modeling information diffusion in signed networks and RID can significantly outperform other comparison methods in identifying rumor initiators.
引用
收藏
页码:1900 / 1909
页数:10
相关论文
共 30 条
[1]  
[Anonymous], 2010, P 19 INT C WORLD WID, DOI DOI 10.1145/1772690.1772755
[2]  
[Anonymous], 2013, ICDM
[3]  
[Anonymous], 1947, The psychology of rumor
[4]  
Chu Yau, 1965, SCI SINICA
[5]  
CORMEN TH, 2001, INTRO ALGORITHMS
[6]  
Doerr B., 2012, COMMUNICATIONS ACM
[7]  
Domingos P., 2001, KDD-2001. Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, P57, DOI 10.1145/502512.502525
[8]  
Edmonds J., 1967, J RES NBS
[9]   A threshold of in n for approximating set cover [J].
Feige, U .
JOURNAL OF THE ACM, 1998, 45 (04) :634-652
[10]  
Guille A., 2013, SIGMOD RECORD