A greedy monitoring station selection for rumor source detection in online social networks |
|
Author: | Jin, Rong1; Garg, Priyanshi2; Wu, Weili2; |
Organizations: |
1Department of Computer Science, College of Engineering and Computer Science, California State University, Fullerton, CA 92831 USA 2Department of Computer Science, Erik Jonsson School of Engineering and Computer Science, The University of Texas at Dallas, Richardson, TX 75080 USA 3School of Computers, Guangdong University of Technology, Guangzhou 510006, China
4Department of Persuasive Information Systems, University of Oulu, 90570 Oulu, Finland
|
Format: | article |
Version: | accepted version |
Access: | open |
Online Access: | PDF Full Text (PDF, 2.1 MB) |
Persistent link: | http://urn.fi/urn:nbn:fi-fe20230913124442 |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers,
2023
|
Publish Date: | 2023-09-13 |
Description: |
AbstractIn monitoring station observation, for the best accuracy of rumor source detection, it is important to deploy monitors appropriately into the network. There are, however, a very limited number of studies on the monitoring station selection. This article will study the problem of detecting a single rumormonger based on an observation of selected infection monitoring stations in a complete snapshot taken at some time in an online social network (OSN) following the independent cascade (IC) model. To deploy monitoring stations into the observed network, we propose an influence-distance-based k -station selection method where the influence distance is a conceptual measurement that estimates the probability that a rumor-infected node can influence its uninfected neighbors. Accordingly, a greedy algorithm is developed to find the best k monitoring stations among all rumor-infected nodes with a 2-approximation. Based on the infection path, which is most likely toward the k infection monitoring stations, we derive that an estimator for the “most like” rumor source under the IC model is the Jordan infection center in a graph. Our theoretical analysis is presented in the article. The effectiveness of our method is verified through experiments over both synthetic and real-world datasets. As shown in the results, our see all
|
Series: |
IEEE transactions on computational social systems |
ISSN: | 2373-7476 |
ISSN-E: | 2329-924X |
ISSN-L: | 2329-924X |
Issue: | Online first |
DOI: | 10.1109/tcss.2023.3284909 |
OADOI: | https://oadoi.org/10.1109/tcss.2023.3284909 |
Type of Publication: |
A1 Journal article – refereed |
Field of Science: |
113 Computer and information sciences |
Subjects: | |
Funding: |
This work was supported in part by the National Science Foundation under Grant 1822985, in part by the National Natural Science Foundation of China under Grant 62202109, in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2021A1515110321 and 2022A1515010611, and in part by Guangzhou Basic and Applied Basic Research Foundation under Grant 202201010676. |
Copyright information: |
© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |