Precautionary rumor containment via trustworthy people in social networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Fan, Lidan | - |
dc.contributor.author | Wu, Weili | - |
dc.contributor.author | Xing, Kai | - |
dc.contributor.author | Lee, Wonjun | - |
dc.date.accessioned | 2021-09-04T02:07:01Z | - |
dc.date.available | 2021-09-04T02:07:01Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2016-03 | - |
dc.identifier.issn | 1793-8309 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/89335 | - |
dc.description.abstract | In a social network, rumor containment is vital, as the diffusion of a rumor will bring terrible results. Precautionary measure can be used to control rumor propagation: Anticipating the spread of a rumor, one can (1) select a set of trustworthy people (TP) in the network, (2) alert the TP about the rumor, and (3) ask the TP to protect their neighbors by sending out alerts. In this paper, we study the problem of how to select the least number of TP, satisfying the requirement that the entire network is protected by the alerts that the TP send. We propose an asymmetric trust (AT) information propagation model. Under this model, we study the Least Number TP Selection (LNTS) problem, establish its NP-hardness and reformulate it as a minimum submodular cover problem. As a result, the Greedy Algorithm is a constant-factor approximation algorithm. Using real-world data, we evaluate the performance of the Greedy Algorithm, and compare it with other algorithms. Experimental results indicate that the Greedy Algorithm performs the best among its competitors. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WORLD SCIENTIFIC PUBL CO PTE LTD | - |
dc.subject | WORM CONTAINMENT | - |
dc.title | Precautionary rumor containment via trustworthy people in social networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Wonjun | - |
dc.identifier.doi | 10.1142/S179383091650004X | - |
dc.identifier.wosid | 000371325500004 | - |
dc.identifier.bibliographicCitation | DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS, v.8, no.1 | - |
dc.relation.isPartOf | DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS | - |
dc.citation.title | DISCRETE MATHEMATICS ALGORITHMS AND APPLICATIONS | - |
dc.citation.volume | 8 | - |
dc.citation.number | 1 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.relation.journalResearchArea | Mathematics | - |
dc.relation.journalWebOfScienceCategory | Mathematics, Applied | - |
dc.subject.keywordPlus | WORM CONTAINMENT | - |
dc.subject.keywordAuthor | Rumor | - |
dc.subject.keywordAuthor | trust | - |
dc.subject.keywordAuthor | social networks | - |
dc.subject.keywordAuthor | social relation graph | - |
dc.subject.keywordAuthor | Greedy Algorithm | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.