Reverse Prevention Sampling for Misinformation Mitigation in Social Networks

Authors Michael Simpson, Venkatesh Srinivasan, Alex Thomo



PDF
Thumbnail PDF

File

LIPIcs.ICDT.2020.24.pdf
  • Filesize: 0.55 MB
  • 18 pages

Document Identifiers

Author Details

Michael Simpson
  • Department of Computer Science, University of Victoria, Canada
Venkatesh Srinivasan
  • Department of Computer Science, University of Victoria, Canada
Alex Thomo
  • Department of Computer Science, University of Victoria, Canada

Cite AsGet BibTex

Michael Simpson, Venkatesh Srinivasan, and Alex Thomo. Reverse Prevention Sampling for Misinformation Mitigation in Social Networks. In 23rd International Conference on Database Theory (ICDT 2020). Leibniz International Proceedings in Informatics (LIPIcs), Volume 155, pp. 24:1-24:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2020)
https://doi.org/10.4230/LIPIcs.ICDT.2020.24

Abstract

In this work, we consider misinformation propagating through a social network and study the problem of its prevention. In this problem, a "bad" campaign starts propagating from a set of seed nodes in the network and we use the notion of a limiting (or "good") campaign to counteract the effect of misinformation. The goal is to identify a set of k users that need to be convinced to adopt the limiting campaign so as to minimize the number of people that adopt the "bad" campaign at the end of both propagation processes. This work presents RPS (Reverse Prevention Sampling), an algorithm that provides a scalable solution to the misinformation prevention problem. Our theoretical analysis shows that RPS runs in O((k + l)(n + m)(1/(1 - γ)) log n / ε²) expected time and returns a (1 - 1/e - ε)-approximate solution with at least 1 - n^{-l} probability (where γ is a typically small network parameter and l is a confidence parameter). The time complexity of RPS substantially improves upon the previously best-known algorithms that run in time Ω(m n k ⋅ POLY(ε^{-1})). We experimentally evaluate RPS on large datasets and show that it outperforms the state-of-the-art solution by several orders of magnitude in terms of running time. This demonstrates that misinformation prevention can be made practical while still offering strong theoretical guarantees.

Subject Classification

ACM Subject Classification
  • Theory of computation → Graph algorithms analysis
  • Theory of computation → Approximation algorithms analysis
Keywords
  • Graph Algorithms
  • Social Networks
  • Misinformation Prevention

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Bob Abeshouse. Troll factories, bots and fake news: Inside the Wild West of social media, February 2018. URL: https://www.aljazeera.com/blogs/americas/2018/02/troll-factories-bots-fake-news-wild-west-social-media-180207061815575.html.
  2. Shishir Bharathi, David Kempe, and Mahyar Salek. Competitive influence maximization in social networks. In WINE'07, pages 306-311, Berlin, Heidelberg, 2007. Springer-Verlag. URL: http://dl.acm.org/citation.cfm?id=1781894.1781932.
  3. Christian Borgs, Michael Brautbar, Jennifer T. Chayes, and Brendan Lucier. Influence Maximization in Social Networks: Towards an Optimal Algorithmic Solution. CoRR, abs/1212.0884, 2012. URL: http://arxiv.org/abs/1212.0884.
  4. C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In WWW'11, 2011. Google Scholar
  5. Wei Chen, Laks V. S. Lakshmanan, and Carlos Castillo. Information and Influence Propagation in Social Networks. Synthesis Lectures on Data Management. Morgan & Claypool Publishers, 2013. URL: https://doi.org/10.2200/S00527ED1V01Y201308DTM037.
  6. Wei Chen, Yifei Yuan, and Li Zhang. Scalable influence maximization in social networks under the linear threshold model. In 2010 IEEE international conference on data mining, pages 88-97. IEEE, 2010. Google Scholar
  7. Lidan Fan, Zaixin Lu, Weili Wu, Bhavani Thuraisingham, Huan Ma, and Yuanjun Bi. Least cost rumor blocking in social networks. In Distributed Computing Systems (ICDCS), 2013 IEEE 33rd International Conference on, pages 540-549. IEEE, 2013. Google Scholar
  8. Qizhi Fang, Xin Chen, Qingqin Nong, Zongchao Zhang, Yongchang Cao, Yan Feng, Tao Sun, Suning Gong, and Ding-Zhu Du. General Rumor Blocking: An Efficient Random Algorithm with Martingale Approach. In International Conference on Algorithmic Applications in Management, pages 161-176. Springer, 2018. Google Scholar
  9. Peter Foster. 'Bogus' AP tweet about explosion at the White House wipes billions off US markets, April 2018. URL: https://www.telegraph.co.uk/finance/markets/10013768/Bogus-AP-tweet-about-explosion-at-the-White-House-wipes-billions-off-US-markets.html.
  10. Amit Goyal, Francesco Bonchi, Laks V. S. Lakshmanan, and Suresh Venkatasubramanian. On minimizing budget and time in influence propagation over social networks. Social Netw. Analys. Mining, 3(2):179-192, 2013. URL: https://doi.org/10.1007/s13278-012-0062-z.
  11. Chris Graham. YouTube employee’s Twitter account hacked to spread fake news during attack, April 2018. URL: https://www.telegraph.co.uk/technology/2018/04/04/youtube-employees-twitter-account-hacked-spread-fake-news-attack/.
  12. Naeemul Hassan, Gensheng Zhang, Fatma Arslan, Josue Caraballo, Damian Jimenez, Siddhant Gawsane, Shohedul Hasan, Minumol Joseph, Aaditya Kulkarni, Anil Kumar Nayak, et al. Claimbuster: The first-ever end-to-end fact-checking system. PVLDB, 10(12):1945-1948, 2017. Google Scholar
  13. Laura Hautala. Reddit was a misinformation hotspot in 2016 election, study says, December 2018. URL: https://www.cnet.com/news/reddit-election-misinformation-2016-research/.
  14. Xinran He, Guojie Song, Wei Chen, and Qingye Jiang. Influence blocking maximization in social networks under the competitive linear threshold model. In Proceedings of the 2012 SIAM International Conference on Data Mining, pages 463-474. SIAM, 2012. Google Scholar
  15. Kyomin Jung, Wooram Heo, and Wei Chen. Irie: Scalable and robust influence maximization in social networks. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages 918-923. IEEE, 2012. Google Scholar
  16. David Kempe, Jon Kleinberg, and Éva Tardos. Maximizing the spread of influence through a social network. In KDD'03, 2003. URL: https://doi.org/10.1145/956750.956769.
  17. Jooyeon Kim, Behzad Tabibian, Alice Oh, Bernhard Schölkopf, and Manuel Gomez-Rodriguez. Leveraging the crowd to detect and reduce the spread of fake news and misinformation. In WSDM, pages 324-332. ACM, 2018. Google Scholar
  18. Jure Leskovec, Daniel Huttenlocher, and Jon Kleinberg. Predicting positive and negative links in online social networks. In WWW '10, pages 641-650, New York, NY, USA, 2010. ACM. URL: https://doi.org/10.1145/1772690.1772756.
  19. Yanhua Li, Wei Chen, Yajun Wang, and Zhi-Li Zhang. Influence Diffusion Dynamics and Influence Maximization in Social Networks with Friend and Foe Relationships. In Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, WSDM '13, pages 657-666, New York, NY, USA, 2013. ACM. URL: https://doi.org/10.1145/2433396.2433478.
  20. Yishi Lin and John CS Lui. Analyzing competitive influence maximization problems with partial information: An approximation algorithmic framework. Performance Evaluation, 91:187-204, 2015. Google Scholar
  21. G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions - I. Mathematical Programming, 14(1):265-294, 1978. URL: https://doi.org/10.1007/BF01588971.
  22. Nam P. Nguyen, Guanhua Yan, My T. Thai, and Stephan Eidenbenz. Containment of Misinformation Spread in Online Social Networks. In Proceedings of the 4th Annual ACM Web Science Conference, WebSci '12, pages 213-222, New York, NY, USA, 2012. ACM. URL: https://doi.org/10.1145/2380718.2380746.
  23. Maya Oppenheim. YouTube shooting: Twitter and Facebook explodes with misinformation and hoaxes, April 2018. URL: https://www.independent.co.uk/news/world/americas/youtube-shooting-fake-news-twitter-facebook-identity-illegal-immigrant-hoax-misinformation-a8287946.html.
  24. Nishith Pathak, Arindam Banerjee, and Jaideep Srivastava. A generalized linear threshold model for multiple cascades. In Data Mining (ICDM), 2010 IEEE 10th International Conference on, pages 965-970. IEEE, 2010. Google Scholar
  25. Kai Shu, H Russell Bernard, and Huan Liu. Studying fake news via network analysis: detection and mitigation. In Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining, pages 43-65. Springer, 2019. Google Scholar
  26. Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, and Huan Liu. Fake news detection on social media: A data mining perspective. ACM SIGKDD Explorations Newsletter, 19(1):22-36, 2017. Google Scholar
  27. Michael Simpson, Venkatesh Srinivasan, and Alex Thomo. Clearing contamination in large networks. IEEE Transactions on Knowledge and Data Engineering, 28(6):1435-1448, 2016. Google Scholar
  28. Michael Simpson, Venkatesh Srinivasan, and Alex Thomo. Reverse Prevention Sampling for Misinformation Mitigation in Social Networks, 2018. URL: http://arxiv.org/abs/1807.01162.
  29. Olivia Solon. Facebook’s failure: did fake news and polarized politics get Trump elected?, November 2018. URL: https://www.theguardian.com/technology/2016/nov/10/facebook-fake-news-election-conspiracy-theories.
  30. Youze Tang, Xiaokui Xiao, and Yanchen Shi. Influence Maximization: Near-optimal Time Complexity Meets Practical Efficiency. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, SIGMOD '14, pages 75-86, New York, NY, USA, 2014. ACM. URL: https://doi.org/10.1145/2588555.2593670.
  31. Sebastian Tschiatschek, Adish Singla, Manuel Gomez Rodriguez, Arpit Merchant, and Andreas Krause. Fake news detection in social networks via crowd signals. In WWW, pages 517-524. WWW, 2018. Google Scholar
  32. Chi Wang, Wei Chen, and Yajun Wang. Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining and Knowledge Discovery, 25(3):545-576, 2012. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail