Skip to main content

Targeted Misinformation Blocking on Online Social Networks

  • Conference paper
  • First Online:
Intelligent Information and Database Systems (ACIIDS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10751))

Included in the following conference series:

Abstract

In this paper, we investigate a problem of finding smallest set of nodes to remove from a social network so that influence reduction of misinformation sources at least a given threshold \(\gamma \), called Targeted Misinformation Blocking (\(\mathsf {TMB}\)) problem. We prove that \(\mathsf {TBM}\) is #P-hard under LT model. For any parameter \(\epsilon \in (0, \gamma )\), we designed \(\mathsf {Greedy}\) algorithm which return the solution A with the expected influence reduction greater than \(\gamma -\epsilon \), and the size of A is within factor \(1\,+\,\ln (\gamma / \epsilon )\) of the optimal size. To speed-up \(\mathsf {Greedy}\) algorithm, we designed an efficient heuristic algorithm, called \(\mathsf {STBM}\) algorithm. Experiments were conducted on real-world networks which showed the effectiveness of proposed algorithms in term of both effectiveness and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nguyen, D.T., Nguyen, N.P., Thai, M.T.: Sources of misinformation in online social networks: who to suspect? In: Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1–6. IEEE (2012)

    Google Scholar 

  2. Zhang, H., Kuhnle, A., Zhang, H., Thai, M.T.: Detecting misinformation in online social networks before it is too late. In: Proceedings of 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 541–548. IEEE (2016)

    Google Scholar 

  3. Nguyen, N.P., Yan, G., Thai, M.T.: Analysis of misinformation containment in online social networks. Comput. Netw. 57, 2133–2146 (2013)

    Article  Google Scholar 

  4. Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of 20th International Conference on World Wide Web, pp. 665–674. ACM (2011)

    Google Scholar 

  5. Tong, H., Prakash, B.A., Tsourakakis, C., Eliassi-Rad, T., Faloutsos, C., Chau, D.H.: On the vulnerability of large graphs. In: Proceedings of IEEE International Conference on Data Mining (ICDM), pp. 1091–1096. IEEE (2010)

    Google Scholar 

  6. Prakash, B.A., Tong, H., Valler, N., Faloutsos, M., Faloutsos, C.: Virus propagation on time-varying networks: theory and immunization algorithms. In: Balcázar, J.L., Bonchi, F., Gionis, A., Sebag, M. (eds.) ECML PKDD 2010. LNCS (LNAI), vol. 6323, pp. 99–114. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15939-8_7

    Chapter  Google Scholar 

  7. Zhang, H., Alim, M., Li, X., Thai, M.T., Nguyen, H.: Misinformation in online social networks: catch them all with limited budget. ACM Trans. Inf. Syst. (TOIS) 34(3), 1–24 (2016)

    Article  Google Scholar 

  8. Zhang, Y., Prakash, B.: DAVA: data-aware vaccine allocation over large networks. ACM Trans. Knowl. Discov 10(2), 1–32 (2015)

    Google Scholar 

  9. Zhang, Y., Adiga, A., Saha, S., Vullikanti, A., Prakash, B.A.: Near-optimal algorithms for controlling propagation at group scale on networks. IEEE Trans. Knowl. Data Eng. 28(12), 3339–3352 (2016)

    Article  Google Scholar 

  10. Song, C., Hsu, W., Lee, M.L.: Node immunization over infectious period. In: Proceedings of 24th ACM International on Conference on Information and Knowledge Management, pp. 831–840. ACM (2015)

    Google Scholar 

  11. Song, C., Hsu, W., Lee, M.L.: Temporal influence blocking: minimizing the effect of misinformation in social networks. In: Proceedings of IEEE 33rd International Conference on Data Engineering, pp. 847–858. IEEE (2017)

    Google Scholar 

  12. Khalil, E.B., Dilkina, B., Song, L.: Scalable diffusion-aware optimization of network topology. In: Proceedings of 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1226–1235. ACM (2014)

    Google Scholar 

  13. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM (2003)

    Google Scholar 

  14. Chen, W., Wang, C., Wang, Y.: Scalable influence maximization in social networks under the linear threshold model. In: Proceedings of 2010 IEEE International Conference on Data Mining, pp. 88–97. IEEE (2010)

    Google Scholar 

  15. Goyal, A., Bonchi, F., Lakshmanan, L.V.S., Venkatasubramanian, S.: On minimizing budget and time in influence propagation over social networks. Soc. Netw. Anal. Min. 2(1), 179–192 (2012)

    Google Scholar 

  16. Valiant, L.G.: The complexity of enumeration and reliability problems. SIAM J. Comput. 8(3), 410–421 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  17. Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., Van-Briesen, J.M., Glance, N.S.: Cost-effective outbreak detection in networks. In: Proceedings of 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM (2007)

    Google Scholar 

  18. Nguyen, D.T., Zhang, H., Das, S., Thai, M.T., Dinh, T.N.: Least cost influence in multiplex social networks: model representation and analysis. In: Proceedings of IEEE 13th International Conference on Data mining, pp. 567–576. IEEE (2013)

    Google Scholar 

  19. Leskovec, J., Kleinberg, J., Faloutsos, C.: Graphs over time: densification laws, shrinking diameters and possible explanations. In: Proceedings of 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 177–187. ACM (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Canh V. Pham .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pham, C.V., Phu, Q.V., Hoang, H.X. (2018). Targeted Misinformation Blocking on Online Social Networks. In: Nguyen, N., Hoang, D., Hong, TP., Pham, H., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2018. Lecture Notes in Computer Science(), vol 10751. Springer, Cham. https://doi.org/10.1007/978-3-319-75417-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75417-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75416-1

  • Online ISBN: 978-3-319-75417-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics