Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Precautionary rumor containment via trustworthy people in social networks

Full metadata record
DC Field Value Language
dc.contributor.authorFan, Lidan-
dc.contributor.authorWu, Weili-
dc.contributor.authorXing, Kai-
dc.contributor.authorLee, Wonjun-
dc.date.accessioned2021-09-04T02:07:01Z-
dc.date.available2021-09-04T02:07:01Z-
dc.date.created2021-06-16-
dc.date.issued2016-03-
dc.identifier.issn1793-8309-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/89335-
dc.description.abstractIn a social network, rumor containment is vital, as the diffusion of a rumor will bring terrible results. Precautionary measure can be used to control rumor propagation: Anticipating the spread of a rumor, one can (1) select a set of trustworthy people (TP) in the network, (2) alert the TP about the rumor, and (3) ask the TP to protect their neighbors by sending out alerts. In this paper, we study the problem of how to select the least number of TP, satisfying the requirement that the entire network is protected by the alerts that the TP send. We propose an asymmetric trust (AT) information propagation model. Under this model, we study the Least Number TP Selection (LNTS) problem, establish its NP-hardness and reformulate it as a minimum submodular cover problem. As a result, the Greedy Algorithm is a constant-factor approximation algorithm. Using real-world data, we evaluate the performance of the Greedy Algorithm, and compare it with other algorithms. Experimental results indicate that the Greedy Algorithm performs the best among its competitors.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWORLD SCIENTIFIC PUBL CO PTE LTD-
dc.subjectWORM CONTAINMENT-
dc.titlePrecautionary rumor containment via trustworthy people in social networks-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Wonjun-
dc.identifier.doi10.1142/S179383091650004X-
dc.identifier.wosid000371325500004-
dc.identifier.bibliographicCitationDISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, v.8, no.1-
dc.relation.isPartOfDISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS-
dc.citation.titleDISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS-
dc.citation.volume8-
dc.citation.number1-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordPlusWORM CONTAINMENT-
dc.subject.keywordAuthorRumor-
dc.subject.keywordAuthortrust-
dc.subject.keywordAuthorsocial networks-
dc.subject.keywordAuthorsocial relation graph-
dc.subject.keywordAuthorGreedy Algorithm-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Won jun photo

Lee, Won jun
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE