Abstract
AbstractThe massive adoption of social networks increased the need to analyze users’ data and interactions to detect and block the spread of propaganda and harassment behaviors, as well as to prevent actions influencing people towards illegal or immoral activities. In this paper, we propose HURI, a method for social network analysis that accurately classifies users as safe or risky, according to their behavior in the social network. Specifically, the proposed hybrid approach leverages both the topology of the network of interactions and the semantics of the content shared by users, leading to an accurate classification also in the presence of noisy data, such as users who may appear to be risky due to the topic of their posts, but are actually safe according to their relationships. The strength of the proposed approach relies on the full and simultaneous exploitation of both aspects, giving each of them equal consideration during the combination phase. This characteristic makes HURI different from other approaches that fully consider only a single aspect and graft partial or superficial elements of the other into the first. The achieved performance in the analysis of a real-world Twitter dataset shows that the proposed method offers competitive performance with respect to eight state-of-the-art approaches.
Funder
Defense Advanced Research Projects Agency
Ministero dell’Istruzione, dell’Università e della Ricerca
Horizon 2020 Framework Programme
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference73 articles.
1. Huang, B., Raisi, E.: Weak Supervision and Machine Learning for Online Harassment Detection, Springer, Cham pp 5–28 (2018)
2. Awan, I.: Cyber-Extremism: Isis and the Power of Social Media. Society 54(2), 138–149 (2017)
3. Al-Rawi, A., Groshek, J.: Jihadist Propaganda on Social Media: An Examination of ISIS Related Content on Twitter. Int J Cyber Warfare and Terrorism (IJCWT) 8(4), 1–15 (2018)
4. Alfifi, M., Kaghazgaran, P., Caverlee, J., Morstatter, F.: A Large-Scale Study of ISIS Social Media Strategy: Community Size, Collective Influence, and Behavioral Impact. Proc. of the International AAAI Conference on Web and Social Media 13, 58–67 (2019)
5. Shaheen, J., et al.: Network of Terror: How Daesh Uses Adaptive Social Networks To Spread Its Message. NATO Strategic Communications Centre of Excellence, Riga, Latvia (2015)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献