Adaptive Rumor Suppression on Social Networks: A Multi-Round Hybrid Approach
Abstract
References
Index Terms
- Adaptive Rumor Suppression on Social Networks: A Multi-Round Hybrid Approach
Recommendations
A study of rumor control strategies on social networks
CIKM '10: Proceedings of the 19th ACM international conference on Information and knowledge managementIn this paper we study and evaluate rumor-like methods for combating the spread of rumors on a social network. We model rumor spread as a diffusion process on a network and suggest the use of an "anti-rumor" process similar to the rumor process. We ...
Evidence-Based Early Rumor Verification in Social Media
Advances in Information RetrievalAbstractA plethora of studies has been conducted in the past years on rumor verification in micro-blogging platforms. However, most of them exploit the propagation network, i.e., replies and retweets to verify rumors. We argue that first, subjective ...
Hadoop Cellular Automata for Identifying Rumor in Social Networks
ISCC-C '13: Proceedings of the 2013 International Conference on Information Science and Cloud Computing CompanionRumors are unavoidable in social networks and spreading through social networks. In this paper, we introduce three roles, which are rumor maker, accomplice and innocent, into social networks. Rumor makers are people who distribute rumors in social ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Key R&D Program of China
- National Natural Science Foundation of China
- Shanghai Rising-Star Program
- Fundamental Research Funds for the Central Universities
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 144Total Downloads
- Downloads (Last 12 months)144
- Downloads (Last 6 weeks)66
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in