Abstract
With the rapid development of social network, the information announced by this platform attracts more and more attention, because of the great harm brought by the false information, researching the false information detection of social network has great significance. This paper presents a model of social network false information detection, which firstly converting the information announced by social network into a three-dimensional vector, then comparing this vector with the three-dimensional vector converted by Internet events and calculating the similarity between social network and Internet, detecting the consistency of social network event and Internet event afterwards, finally gathering statistics and analyzing then we can get the similarity between social network event and Internet event, according to this, we can judge that the social network information is false or not.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sina Technology. The Twitter of AP is attacked: announcing the false information that Obama has been attacked, 24 April 2013. http://www.ahwang.cn/zbah/20160319/1503617.shtml
Anhui Network: Somebody infect H7N9 because eating chicken in Huainan? Official: It is false information, 19 March 2016. http://tech.sina.com.cn/i/2013-04-24/08198273255.shtml
Akritidis, L., Katsaros, D., Bozanis, P.: Identifying the productive and influential bloggers in a community. IEEE Trans. Syst. Man Cybern. 41(5), 759–764 (2011)
Zolfaghar, K., Aghaie, A.: A syntactical approach for interpersonal trust prediction in social web applications: combining contextual and structural data. Knowl.-Based Syst. 26, 93–102 (2012)
Calais, G.P.H., Adriano, V., Wagner, M., VirgÃlio, A.: From bias to opinion: a transfer-learning approach to real-time sentiment analysis. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 150–158. ACM, CA (2011)
Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the International Conference on World Wide Web (WWW), pp. 675–684 (2011)
Qiao, X.Q., Yang, C., Li, X.F., et al.: A trust calculating algorithm based on social networking service users’ context. Jisuanji Xuebao Chin. J. Comput. 34(12), 2403–2413 (2011)
Liu, T.: The problem of Internet information reliability, 01 December 2012. http://caai.cn/contents/49/102.html
Page, L., Brin, S., Motwani, R., et al.: The PageRank citation ranking: bringing order to the web (1999)
Sites, T.: Alexa Rank. The top, 500
Chen, Z., Ji, H.: Language specific issue and feature exploration in Chinese event extraction. In: Proceedings of the HLT-NAACL 2009, pp. 209–212. Omnipress, Madison (2009)
Lu, S., Bai, S.: Quantitative analysis of context field in natural language processing. Chin. J. Comput. Chin. Ed. 24(7), 742–747 (2001)
Liu, Q., Li, S.: Word similarity computing based on How-Net. Comput. Linguist. Chin. Lang. Process. 7(2), 59–76 (2002)
Acknowledgments
The author thanks the editor and reviewers for their suggestions to improve the quality of paper. This work was supported by the National Key Research and Development Program of China under Grant 2016YFB0800404 and NSF of China (U1536118) and NSF of China (U1433105).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Xu, Y., Li, F., Liu, J., Zhang, R., Yao, Y., Zhang, D. (2017). Detecting False Information of Social Network in Big Data. In: Wang, S., Zhou, A. (eds) Collaborate Computing: Networking, Applications and Worksharing. CollaborateCom 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 201. Springer, Cham. https://doi.org/10.1007/978-3-319-59288-6_65
Download citation
DOI: https://doi.org/10.1007/978-3-319-59288-6_65
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59287-9
Online ISBN: 978-3-319-59288-6
eBook Packages: Computer ScienceComputer Science (R0)