Cost-Efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks

被引:237
作者
He, Zaobo [1 ]
Cai, Zhipeng [1 ]
Yu, Jiguo [2 ]
Wang, Xiaoming [3 ]
Sun, Yunchuan [4 ]
Li, Yingshu [1 ]
机构
[1] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30302 USA
[2] Qufu Normal Univ, Sch Informat Sci & Engn, Rizhao 276826, Peoples R China
[3] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
[4] Beijing Normal Univ, Sch Business, Beijing 100875, Peoples R China
基金
中国博士后科学基金; 美国国家科学基金会;
关键词
Blocking rumors; maximum immunization period; Pontryagin's maximum principle; pulse immunization; spreading truth; MODEL;
D O I
10.1109/TVT.2016.2585591
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the popularity of mobile devices, mobile social networks (MSNs) have become an important platform for information dissemination. However, the spread of rumors in MSNs present a massive social threat. Currently, there are two kinds of methods to address this: blocking rumors at influential users and spreading truth to clarify rumors. However, most existing works either overlook the cost of various methods or only consider different methods individually. This paper proposes a heterogeneous-network-based epidemic model that incorporates the two kinds of methods to describe rumor spreading in MSNs. Moreover, two cost-efficient strategies are designed to restrain rumors. The first strategy is the real-time optimization strategy that minimizes the rumor-restraining cost by optimally combining various rumor-restraining methods such that a rumor can be extinct within an expected time period. The second strategy is the pulse spreading truth and continuous blocking rumor strategy that restrains rumor spreading through spreading truth periodically. The two strategies can restrain rumors in a continuous or periodical manner and guarantee cost efficiency. The experiments toward the Digg2009 data set demonstrate the effectiveness of the proposed model and the efficiency of the two strategies.
引用
收藏
页码:2789 / 2800
页数:12
相关论文
共 26 条
  • [1] Error and attack tolerance of complex networks
    Albert, R
    Jeong, H
    Barabási, AL
    [J]. NATURE, 2000, 406 (6794) : 378 - 382
  • [2] [Anonymous], RES REV J ECOLOGY EN, DOI DOI 10.1145/2463209.2488734
  • [3] Inoculation strategies for victims of viruses and the sum-of-squares partition problem
    Aspnes, James
    Chang, Kevin
    Yampolskiy, Aleksandr
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2006, 72 (06) : 1077 - 1093
  • [4] Bao YY, 2014, INT CONF COMPUT NETW, P11, DOI 10.1109/ICCNC.2014.6785296
  • [5] Efficient immunization strategies for computer networks and populations
    Cohen, R
    Havlin, S
    ben-Avraham, D
    [J]. PHYSICAL REVIEW LETTERS, 2003, 91 (24)
  • [6] Daley D. J., 1965, IMA J APPL MATH, V1, P42, DOI DOI 10.1093/IMAMAT/1.1.42
  • [7] Why Rumors Spread So Quickly in Social Networks
    Doer, Benjamin
    Fouz, Mahmoud
    Friedrich, Tobias
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (06) : 70 - 75
  • [8] Ferdinand V., 2000, NONLINEAR DIFFERENTI
  • [9] Habiba, 2010, LECT NOTES COMPUT SC, V5498, P55
  • [10] Hartman P., 2002, Ordinary Differential Equations