Study on the Rumor Propagation Model with Penalty Factor

Author(s):  
Qianqian Huang ◽  
Dan Wang
Author(s):  
Yunpeng Xiao ◽  
Wen Li ◽  
Shuai Qiang ◽  
Qian Li ◽  
Hanchun Xiao ◽  
...  

2021 ◽  
Vol 33 (1) ◽  
pp. 47-70
Author(s):  
Santhoshkumar Srinivasan ◽  
Dhinesh Babu L. D.

Online social networks (OSNs) are used to connect people and propagate information around the globe. Along with information propagation, rumors also penetrate across the OSNs in a massive order. Controlling the rumor propagation is utmost important to reduce the damage it causes to society. Educating the individual participants of OSNs is one of the effective ways to control the rumor faster. To educate people in OSNs, this paper proposes a defensive rumor control approach that spreads anti-rumors by the inspiration from the immunization strategies of social insects. In this approach, a new information propagation model is defined to study the defensive nature of true information against rumors. Then, an anti-rumor propagation method with a set of influential spreaders is employed to defend against the rumor. The proposed approach is compared with the existing rumor containment approaches and the results indicate that the proposed approach works well in controlling the rumors.


2017 ◽  
Vol 41 (4) ◽  
pp. 1661-1673 ◽  
Author(s):  
Fangju Jia ◽  
Guangying Lv ◽  
Guang-an Zou

2013 ◽  
Vol 717 ◽  
pp. 808-811 ◽  
Author(s):  
Yuan Zhang ◽  
Ye Guo

Rumor is one of the principal factors to affect public sentiment. With the development of Internet, the group of the micro-bloggers continuously grows. The special propagation mode of micro-blogging brings challenge to the rumor management. This article summarizes the features of information dissemination of micro-blogging and has a review on the traditional rumor propagation models. Furthermore, the process of rumor propagation on the micro-blogging platform is deeply analyzed, the micro-bloggers in the process of rumor propagation are classified and the rumor propagation model on the micro-blogging platform is initially studied and established. The study of this article lays a foundation for further study on rumor management on the micro-blogging platform.


2014 ◽  
Vol 415 ◽  
pp. 333-346 ◽  
Author(s):  
Nan Zhang ◽  
Hong Huang ◽  
Boni Su ◽  
Jinlong Zhao ◽  
Bo Zhang

2016 ◽  
Vol 08 (01) ◽  
pp. 1650004 ◽  
Author(s):  
Lidan Fan ◽  
Weili Wu ◽  
Kai Xing ◽  
Wonjun Lee

In a social network, rumor containment is vital, as the diffusion of a rumor will bring terrible results. Precautionary measure can be used to control rumor propagation: Anticipating the spread of a rumor, one can (1) select a set of trustworthy people (TP) in the network, (2) alert the TP about the rumor, and (3) ask the TP to protect their neighbors by sending out alerts. In this paper, we study the problem of how to select the least number of TP, satisfying the requirement that the entire network is protected by the alerts that the TP send. We propose an asymmetric trust (AT) information propagation model. Under this model, we study the Least Number TP Selection (LNTS) problem, establish its NP-hardness and reformulate it as a minimum submodular cover problem. As a result, the Greedy Algorithm is a constant-factor approximation algorithm. Using real-world data, we evaluate the performance of the Greedy Algorithm, and compare it with other algorithms. Experimental results indicate that the Greedy Algorithm performs the best among its competitors.


Sign in / Sign up

Export Citation Format

Share Document