Misinformation in Online Social Networks: Detect Them All with a Limited Budget

Online social networks have become an effective and important social platform for communication, opinions exchange, and information sharing. However, they also make it possible for rapid and wide misinformation diffusion, which may lead to pernicious influences on individuals or society. Hence, it is extremely important and necessary to detect the misinformation propagation by placing monitors. In this article, we first define a general misinformation-detection problem for the case where the knowledge about misinformation sources is lacking, and show its equivalence to the influence-maximization problem in the reverse graph. Furthermore, considering node vulnerability, we aim to detect the misinformation reaching to a specific user. Therefore, we study a τ-Monitor Placement problem for cases where partial knowledge of misinformation sources is available and prove its #P complexity. We formulate a corresponding integer program, tackle exponential constraints, and propose a Minimum Monitor Set Construction (MMSC) algorithm, in which the cut-set2 has been exploited in the estimation of reachability of node pairs. Moreover, we generalize the problem from a single target to multiple central nodes and propose another algorithm based on a Monte Carlo sampling technique. Extensive experiments on real-world networks show the effectiveness of proposed algorithms with respect to minimizing the number of monitors.

[1]  Bernhard Schölkopf,et al.  Influence Maximization in Continuous Time Diffusion Networks , 2012, ICML.

[2]  Leslie G. Valiant,et al.  The Complexity of Enumeration and Reliability Problems , 1979, SIAM J. Comput..

[3]  Laks V. S. Lakshmanan,et al.  Learning influence probabilities in social networks , 2010, WSDM '10.

[4]  Krishna P. Gummadi,et al.  A measurement-driven analysis of information propagation in the flickr social network , 2009, WWW '09.

[5]  Nam P. Nguyen,et al.  Containment of misinformation spread in online social networks , 2012, WebSci '12.

[6]  N. Christakis,et al.  Social Network Sensors for Early Detection of Contagious Outbreaks , 2010, PloS one.

[7]  Lora Aroyo,et al.  Analyzing user behavior across social sharing environments , 2013, ACM Trans. Intell. Syst. Technol..

[8]  Jaideep Srivastava,et al.  A Generalized Linear Threshold Model for Multiple Cascades , 2010, 2010 IEEE International Conference on Data Mining.

[9]  Weili Wu,et al.  Least Cost Rumor Blocking in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[10]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[11]  Leysia Palen,et al.  Twitter adoption and use in mass convergence and emergency events , 2009 .

[12]  Jacob Ratkiewicz,et al.  Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.

[13]  Sameep Mehta,et al.  Towards combating rumors in social networks: Models and metrics , 2013, Intell. Data Anal..

[14]  Yifei Yuan,et al.  Scalable Influence Maximization in Social Networks under the Linear Threshold Model , 2010, 2010 IEEE International Conference on Data Mining.

[15]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[16]  Dragomir R. Radev,et al.  Rumor has it: Identifying Misinformation in Microblogs , 2011, EMNLP.

[17]  Weili Wu,et al.  A novel approach for detecting multiple rumor sources in networks with partial observations , 2017, J. Comb. Optim..

[18]  Ben Y. Zhao,et al.  Understanding latent interactions in online social networks , 2010, TWEB.

[19]  Jacob Ratkiewicz,et al.  Predicting the Political Alignment of Twitter Users , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[20]  Barbara Poblete,et al.  Twitter under crisis: can we trust what we RT? , 2010, SOMA '10.

[21]  Philip S. Yu,et al.  Extracting social events for learning better information diffusion models , 2013, KDD.

[22]  Vasileios Karyotis,et al.  Diffusion Models for Information Dissemination Dynamics in Wireless Complex Communication Networks , 2013 .

[23]  Christos Faloutsos,et al.  Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.

[24]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[25]  Devavrat Shah,et al.  Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.

[26]  Cécile Favre,et al.  Information diffusion in online social networks: a survey , 2013, SGMD.

[27]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[28]  E. Segev,et al.  Social Media and the Arab Spring , 2013 .

[29]  Wuqiong Luo,et al.  Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.

[30]  Zhiyuan Cheng,et al.  Detecting collective attention spam , 2012, WebQuality '12.

[31]  Andreas Krause,et al.  Submodularity and its applications in optimized information gathering , 2011, TIST.

[32]  Naren Ramakrishnan,et al.  Epidemiological modeling of news and rumors on Twitter , 2013, SNAKDD '13.

[33]  Eunsoo Seo,et al.  Identifying rumors and their sources in social networks , 2012, Defense + Commercial Sensing.

[34]  Kyomin Jung,et al.  Prominent Features of Rumor Propagation in Online Social Media , 2013, 2013 IEEE 13th International Conference on Data Mining.

[35]  Robert F. Belli,et al.  Misinformation Effects and the Suggestibility of Eyewitness Memory. , 2013 .

[36]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[37]  Salvatore Catanese,et al.  Crawling Facebook for social network analysis purposes , 2011, WIMS '11.

[38]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[39]  Sameep Mehta,et al.  A study of rumor control strategies on social networks , 2010, CIKM.