Author:
Liu YanXia,Li WeiMin,Yang Chao,Wang JianJia
Abstract
AbstractThe rapid development of social networking platforms has accelerated the spread of false information. Effective source location methods are essential to control the spread of false information. Most existing methods fail to make full use of the infection of neighborhood information in nodes, resulting in a poor source localization effect. In addition, most existing methods ignore the existence of multiple source nodes in the infected cluster and hard to identify the source nodes comprehensively. To solve these problems, we propose a new method about the multiple sources location with the neighborhood entropy. The method first defines the two kinds of entropy, i.e. infection adjacency entropy and infection intensity entropy, depending on whether neighbor nodes are infected or not. Then, the possibility of a node is evaluated by the neighborhood entropy. To locate the source nodes comprehensively, we propose a source location algorithm with the infected clusters. Other unrecognized source nodes in the infection cluster are identified by the cohesion of nodes, which can deal with the situation in the multiple source nodes in an infected cluster. We conduct experiments on various network topologies. Experimental results show that the two proposed algorithms outperform the existing methods.
Publisher
Springer Science and Business Media LLC
Reference40 articles.
1. Shelke, S. & Attar, V. Source detection of rumor in social network—a review. Online Soc. Netw. Media 9, 30–42 (2019).
2. Kalvit, A., Borkar, V. S. & Karamchandani, N. Stochastic approximation algorithms for rumor source inference on graphs. Perform. Eval. 132, 1–20. https://doi.org/10.1016/J.PEVA.2019.03.002 (2019).
3. Kouzy, R. et al. Coronavirus goes viral: Quantifying the covid-19 misinformation epidemic on twitter. Cureus 12, 20 (2020).
4. Wang, H. An universal algorithm for source location in complex networks. Phys. A Stat. Mech. Appl. 514, 620–630 (2019).
5. Shah, D. & Zaman, T. Rumors in a network: Who’s the culprit?. IEEE Trans. Inf. Theory 57, 5163–5181 (2011).
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献