Abstract
This work studies controlling rumor cascade over social networks problem. Previous research was mainly focused on removing nodes or edges to achieve the desired outcome. For this study, we firstly propose effective algorithms to solve rumor cascade controlling problem. Second, we conduct a theoretical study for our methods, including the hardness of the problem, the accuracy and complexity. Lastly, we conduct experiments on synthetic data set and compare results with local structure node measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zafarani, R., Abbasi, M.A., Liu, H.: Social Media Mining: An Introduction. Cambridge University Press, Cambridge (2014)
Ryan, B., Gross, N.: The diffusion of hybrid seed corn in two iowa communities. Rural Sociol. 8(1), 15–24 (1943)
Coleman, J.S., Katz, E., Menzel, H.: Medical Innovation: A Diffusion Study. Bobbs-Merrill, New York (1966)
Oreo Cookie. Power out? No problem. Commercial (2013)
Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 137–146. ACM, New York (2003)
Kimura, M., Saito, K., Motoda, H.: Blocking links to minimize contamination spread in a social network. ACM Trans. Knowl. Discov. Data 3(2), 9:1–9:23 (2009)
Kuhlman, C.J., Tuli, G., Swarup, S., Marathe, M.V., Ravi, S.S.: Blocking simple and complex contagion by edge removal. In: 2013 IEEE 13th International Conference on Data Mining, Dallas, TX, USA, 7–10 December 2013, pp. 399–408 (2013)
Kuhlman, C.J., Kumar, V.S.A., Ravi, S.S.: Controlling opinion propagation in online networks. Comput. Netw. 57(10), 2121–2132 (2013). Towards a Science of Cyber Security Security and Identity Architecture for the Future Internet
Callaway, D.S., Newman, M.E.J., Strogatz, S.H., Watts, D.J.: Network robustness and fragility: percolation on random graphs. Phys. Rev. Lett. 85(25), 5468–5471 (2000)
Albert, R., Jeong, H., Barabási, A.-L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)
Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, WWW 2011, pp. 665–674. ACM, New York (2011)
Tong, H., Prakash, B.A., Tsourakakis, C., Eliassi-Rad, T., Faloutsos, C., Chau, D.H.: On the vulnerability of large graphs. In: 2010 IEEE 10th International Conference on Data Mining (ICDM), pp. 1091–1096. IEEE (2010)
Tong, H., Prakash, B.A., Eliassi-Rad, T., Faloutsos, M., Faloutsos, C.: Gelling, and melting, large graphs by edge manipulation. In: Chen, X.W., Lebanon, G., Wang, H., Zaki, M.J. (eds.) CIKM, pp. 245–254. ACM (2012)
Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 91, 247901 (2003)
Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, pp. 1029–1038 (2010)
David, E., Jon, K.: Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge University Press, New York (2010)
Guille, A., Hacid, H., Favre, C., Zighed, D.A.: Information diffusion in online social networks: a survey. SIGMOD Rec. 42(2), 17–28 (2013)
Kleinberg, J.: Cascading behavior in networks: algorithmic and economic issues. Algorithmic Game Theory 24, 613–632 (2007)
Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of approximations for maximizing submodular set functions-I. Math. Program. 14(1), 265–294 (1978)
Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., Van Briesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International conference on Knowledge Discovery and Data Mining, KDD 2007, pp. 420–429 (2007)
Csardi, G., Nepusz, T.: The igraph software package for complex network research. Inter J. Complex Syst. 1695, 1–9 (2006)
Narayanam, R., Garg, D., Lamba, H.: Discovering signature of social networks with application to community detection. In: 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS), pp. 1–7. IEEE (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Ibrahim, R.A., Hefny, H.A., Hassanien, A.E. (2017). Controlling Rumor Cascade over Social Networks. In: Hassanien, A., Shaalan, K., Gaber, T., Azar, A., Tolba, M. (eds) Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2016. AISI 2016. Advances in Intelligent Systems and Computing, vol 533. Springer, Cham. https://doi.org/10.1007/978-3-319-48308-5_44
Download citation
DOI: https://doi.org/10.1007/978-3-319-48308-5_44
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48307-8
Online ISBN: 978-3-319-48308-5
eBook Packages: EngineeringEngineering (R0)