Abstract
In this paper, we investigate a problem of finding smallest set of nodes to remove from a social network so that influence reduction of misinformation sources at least a given threshold \(\gamma \), called Targeted Misinformation Blocking (\(\mathsf {TMB}\)) problem. We prove that \(\mathsf {TBM}\) is #P-hard under LT model. For any parameter \(\epsilon \in (0, \gamma )\), we designed \(\mathsf {Greedy}\) algorithm which return the solution A with the expected influence reduction greater than \(\gamma -\epsilon \), and the size of A is within factor \(1\,+\,\ln (\gamma / \epsilon )\) of the optimal size. To speed-up \(\mathsf {Greedy}\) algorithm, we designed an efficient heuristic algorithm, called \(\mathsf {STBM}\) algorithm. Experiments were conducted on real-world networks which showed the effectiveness of proposed algorithms in term of both effectiveness and efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nguyen, D.T., Nguyen, N.P., Thai, M.T.: Sources of misinformation in online social networks: who to suspect? In: Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1–6. IEEE (2012)
Zhang, H., Kuhnle, A., Zhang, H., Thai, M.T.: Detecting misinformation in online social networks before it is too late. In: Proceedings of 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 541–548. IEEE (2016)
Nguyen, N.P., Yan, G., Thai, M.T.: Analysis of misinformation containment in online social networks. Comput. Netw. 57, 2133–2146 (2013)
Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of 20th International Conference on World Wide Web, pp. 665–674. ACM (2011)
Tong, H., Prakash, B.A., Tsourakakis, C., Eliassi-Rad, T., Faloutsos, C., Chau, D.H.: On the vulnerability of large graphs. In: Proceedings of IEEE International Conference on Data Mining (ICDM), pp. 1091–1096. IEEE (2010)
Prakash, B.A., Tong, H., Valler, N., Faloutsos, M., Faloutsos, C.: Virus propagation on time-varying networks: theory and immunization algorithms. In: Balcázar, J.L., Bonchi, F., Gionis, A., Sebag, M. (eds.) ECML PKDD 2010. LNCS (LNAI), vol. 6323, pp. 99–114. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15939-8_7
Zhang, H., Alim, M., Li, X., Thai, M.T., Nguyen, H.: Misinformation in online social networks: catch them all with limited budget. ACM Trans. Inf. Syst. (TOIS) 34(3), 1–24 (2016)
Zhang, Y., Prakash, B.: DAVA: data-aware vaccine allocation over large networks. ACM Trans. Knowl. Discov 10(2), 1–32 (2015)
Zhang, Y., Adiga, A., Saha, S., Vullikanti, A., Prakash, B.A.: Near-optimal algorithms for controlling propagation at group scale on networks. IEEE Trans. Knowl. Data Eng. 28(12), 3339–3352 (2016)
Song, C., Hsu, W., Lee, M.L.: Node immunization over infectious period. In: Proceedings of 24th ACM International on Conference on Information and Knowledge Management, pp. 831–840. ACM (2015)
Song, C., Hsu, W., Lee, M.L.: Temporal influence blocking: minimizing the effect of misinformation in social networks. In: Proceedings of IEEE 33rd International Conference on Data Engineering, pp. 847–858. IEEE (2017)
Khalil, E.B., Dilkina, B., Song, L.: Scalable diffusion-aware optimization of network topology. In: Proceedings of 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1226–1235. ACM (2014)
Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM (2003)
Chen, W., Wang, C., Wang, Y.: Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of 2010 IEEE International Conference on Data Mining, pp. 88–97. IEEE (2010)
Goyal, A., Bonchi, F., Lakshmanan, L.V.S., Venkatasubramanian, S.: On minimizing budget and time in influence propagation over social networks. Soc. Netw. Anal. Min. 2(1), 179–192 (2012)
Valiant, L.G.: The complexity of enumeration and reliability problems. SIAM J. Comput. 8(3), 410–421 (1979)
Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., Van-Briesen, J.M., Glance, N.S.: Cost-effective outbreak detection in networks. In: Proceedings of 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM (2007)
Nguyen, D.T., Zhang, H., Das, S., Thai, M.T., Dinh, T.N.: Least cost influence in multiplex social networks: model representation and analysis. In: Proceedings of IEEE 13th International Conference on Data mining, pp. 567–576. IEEE (2013)
Leskovec, J., Kleinberg, J., Faloutsos, C.: Graphs over time: densification laws, shrinking diameters and possible explanations. In: Proceedings of 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 177–187. ACM (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Pham, C.V., Phu, Q.V., Hoang, H.X. (2018). Targeted Misinformation Blocking on Online Social Networks. In: Nguyen, N., Hoang, D., Hong, TP., Pham, H., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2018. Lecture Notes in Computer Science(), vol 10751. Springer, Cham. https://doi.org/10.1007/978-3-319-75417-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-75417-8_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75416-1
Online ISBN: 978-3-319-75417-8
eBook Packages: Computer ScienceComputer Science (R0)