Rumor Remove Order Strategy on Social Networks

Rumors are defined as widely spread talk with no reliable source to back it up. In modern society, the rumors are widely spreading on the social network. The spread of rumors poses great challenges for the society. A ”fake news” story can rile up your emotions and change your mood. Some rumors can even cause social panic and economic losses. As such, the influence of rumors can be far-reaching and long-lasting. Efficient and intelligent rumor control strategies are necessary to constrain the spread of rumors. Existing rumor control strategies are designed for controlling a single rumor. However, there are usually many rumors existing on social networks and only limited rumors can be removed at a time due to the limited detection capacity and CPU performance. Consequently, when dealing with multiple rumors, we should remove rumors in a certain order. We argue that the order of removing rumors matters as different rumors possess different properties, e.g., acceptance rate, propagation speed, etc. Unfortunately, to the best of our knowledge, there is no prior work on removing multiple rumors and the order of removing rumors. To this end, this paper proposes two novel rumor control strategies to remove the multiple rumors. We also extends the classical Susceptible Infected Recovered (SIR) model to simulate the dynamics of rumor propagation in a more practical manner. We evaluate the performance of strategies. The experiments show that our proposed rumor control strategies obviously outperform than benchmark strategy.

[1]  Jiajia Wang,et al.  SIR rumor spreading model in the new media age , 2013 .

[2]  Sun-Ho Choi,et al.  A multi-stage SIR model for rumor spreading , 2020, Discrete & Continuous Dynamical Systems - B.

[3]  Liang Zheng,et al.  A probabilistic characterization of the rumor graph boundary in rumor source detection , 2015, 2015 IEEE International Conference on Digital Signal Processing (DSP).

[4]  Deying Li,et al.  An efficient randomized algorithm for rumor blocking in online social networks , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[5]  Chee Wei Tan,et al.  Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.

[6]  Weili Wu,et al.  A novel approach for detecting multiple rumor sources in networks with partial observations , 2015, Journal of Combinatorial Optimization.

[7]  Michel L. Goldstein,et al.  Problems with fitting to the power-law distribution , 2004, cond-mat/0402322.

[8]  Yuanda Wang,et al.  Dependable Policy Enforcement in Traditional Non-SDN Networks , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).

[9]  Deying Li,et al.  Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and Analysis , 2020, IEEE Transactions on Network Science and Engineering.

[10]  Joy Kuri,et al.  Optimal control of information epidemics modeled as Maki Thompson rumors , 2014, Commun. Nonlinear Sci. Numer. Simul..

[11]  Lei Ying,et al.  A robust information source estimator with sparse observations , 2013, Computational Social Networks.

[12]  Juan Cao,et al.  Rumor detection based on topic classification and multi-scale feature fusion , 2020, Journal of Physics: Conference Series.

[13]  Yao Wang,et al.  Minimizing the influence of dynamic rumors based on community structure , 2019 .

[14]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[15]  WangZhaoxu,et al.  Rumor source detection with multiple observations , 2014 .

[16]  Xin Chen,et al.  Centralized and decentralized rumor blocking problems , 2017, J. Comb. Optim..

[17]  R. Amutha,et al.  Semi-Supervised Clustering Algorithm for Rumor Minimization and Propagation with Classification in Social Networks , 2020, 2020 International Conference on Inventive Computation Technologies (ICICT).

[18]  R. Kelly Garrett,et al.  Electoral Consequences of Political Rumors: Motivated Reasoning, Candidate Rumors, and Vote Choice during the 2008 U.S. Presidential Election , 2014 .

[19]  Devavrat Shah,et al.  Detecting sources of computer viruses in networks: theory and experiment , 2010, SIGMETRICS '10.

[20]  Jingjing Cheng,et al.  SIHR rumor spreading model in social networks , 2012 .

[21]  John C. Butcher,et al.  Runge-Kutta methods , 2007, Scholarpedia.

[22]  Wei Chen,et al.  Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.

[23]  Donghyun Kim,et al.  Rumor restriction in Online Social Networks , 2013, 2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC).

[24]  Yi Guo,et al.  Rumor events detection enhanced by encoding sentimental information into time series division and word representations , 2020, Neurocomputing.

[25]  Yiliang Han,et al.  Rumor Spreading Model with Trust Mechanism in Complex Social Networks , 2013 .

[26]  Zhipeng Cai,et al.  Modeling Propagation Dynamics and Developing Optimized Countermeasures for Rumor Spreading in Online Social Networks , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.

[27]  L. D. Dhinesh Babu,et al.  A Neuro-Fuzzy Approach to Detect Rumors in Online Social Networks , 2020, Int. J. Web Serv. Res..