DocumentCode :
175341
Title :
Time Critical Disinformation Influence Minimization in Online Social Networks
Author :
Chuan Luo ; Kainan Cui ; Xiaolong Zheng ; Zeng, Deze
Author_Institution :
State Key Lab. of Manage. & Control for Complex Syst., Inst. of Autom., Beijing, China
fYear :
2014
fDate :
24-26 Sept. 2014
Firstpage :
68
Lastpage :
74
Abstract :
If a piece of disinformation released from a terrorist organization propagates on Twitter and this adversarial campaign is detected after a while, how emergence responders can wisely choose a set of source users to start the counter campaign to minimize the disruptive influence of disinformation in a short time? This practical problem is challenging and critical for authorities to make online social networks a more trustworthy source of information. In this work, we propose to study the time critical disinformation influence minimization problem in online social networks based on a continuous-time multiple campaign diffusion model. We show that the complexity of this optimization problem is NP-hard and provide a provable guaranteed approximation algorithm for this problem by proving several critical properties of the objective function. Experimental results on a sample of real online social network show that the proposed approximation algorithm outperforms various heuristics and the transmission temporal dynamics knowledge is vital for selecting the counter campaign source users, especially when the time window is small.
Keywords :
approximation theory; computational complexity; minimisation; social networking (online); NP-hard optimization problem; Twitter; adversarial campaign; approximation algorithm; minimization; objective function; online social network; terrorist organization; time critical disinformation; time window; transmission temporal dynamics knowledge; Greedy algorithms; Information processing; Linear programming; Minimization; Optimization; Radiation detectors; Social network services; competing campaigns; disinformation; information cascades; social networks; submodular functions;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint
Conference_Location :
The Hague
Print_ISBN :
978-1-4799-6363-8
Type :
conf
DOI :
10.1109/JISIC.2014.20
Filename :
6975556
Link To Document :
بازگشت