
Rumors refer to spontaneously formed false stories. As rumors have shown severe threats to human society, it is significant to curb rumor propagation. Rumor clarification is an effective countermeasure on controlling rumor propagation. In this process, anti-rumor messages can be published through multiple media channels, including but not limited to online social platforms, TV programs and offline face-to-face campaigns. As the efficiency and cost of releasing anti-rumor information can vary from media channel to media channel, provided that the total budget is limited and fixed, it is valuable to investigate how to periodically select a combination of media channels to publish anti-rumor information so as to maximize the efficiency (i.e., make as many individuals as possible know the anti-rumor information) with the lowest cost. We refer to this issue as the dynamic channel selection (DCS) problem and any solution as a DCS strategy. To address the DCS problem, our contributions are as follows. First, we propose a rumor propagation model to characterize the influences of DCS strategies on curbing rumors. On this basis, we establish a trade-off model to evaluate DCS strategies and reduce the DCS problem to a mathematical optimization model called the DCS model. Second, based on the genetic algorithm framework, we develop a numerical method called the DCS algorithm to solve the DCS model. Third, we perform a series of numerical experiments to verify the performance of the DCS algorithm. Results show that the DCS algorithm can efficiently yield a satisfactory DCS strategy.
Citation: Yi Wang, Shicheng Zhong, Guo Wang. Dynamic selection of clarification channels in rumor propagation containment[J]. Mathematical Biosciences and Engineering, 2023, 20(8): 14995-15017. doi: 10.3934/mbe.2023672
[1] | Ying Yu, Jiaomin Liu, Jiadong Ren, Cuiyi Xiao . Stability analysis and optimal control of a rumor propagation model based on two communication modes: friends and marketing account pushing. Mathematical Biosciences and Engineering, 2022, 19(5): 4407-4428. doi: 10.3934/mbe.2022204 |
[2] | Jing Liao, Jinling Wang, Jiarong Li, Xin Jiang . The dynamics and control of a multi-lingual rumor propagation model with non-smooth inhibition mechanism. Mathematical Biosciences and Engineering, 2024, 21(4): 5068-5091. doi: 10.3934/mbe.2024224 |
[3] | Hong Wu, Zhijian Zhang, Yabo Fang, Shaotang Zhang, Zuo Jiang, Jian Huang, Ping Li . Containment of rumor spread by selecting immune nodes in social networks. Mathematical Biosciences and Engineering, 2021, 18(3): 2614-2631. doi: 10.3934/mbe.2021133 |
[4] | Yi Wang, Shicheng Zhong, Guo Wang . Preventing online disinformation propagation: Cost-effective dynamic budget allocation of refutation, media censorship, and social bot detection. Mathematical Biosciences and Engineering, 2023, 20(7): 13113-13132. doi: 10.3934/mbe.2023584 |
[5] | Wei Zhong, Li Mao, Wei Du . A signal quality assessment method for fetal QRS complexes detection. Mathematical Biosciences and Engineering, 2023, 20(5): 7943-7956. doi: 10.3934/mbe.2023344 |
[6] | Peng Lu, Rong He, Dianhan Chen . Exploring S-shape curves and heterogeneity effects of rumor spreading in online collective actions. Mathematical Biosciences and Engineering, 2022, 19(3): 2355-2380. doi: 10.3934/mbe.2022109 |
[7] | Virginia González-Vélez, Amparo Gil, Iván Quesada . Minimal state models for ionic channels involved in glucagon secretion. Mathematical Biosciences and Engineering, 2010, 7(4): 793-807. doi: 10.3934/mbe.2010.7.793 |
[8] | Yongjie Zhao, Sida Li, Zhiping Huang . TI-ADC multi-channel mismatch estimation and calibration in ultra-high-speed optical signal acquisition system. Mathematical Biosciences and Engineering, 2021, 18(6): 9050-9075. doi: 10.3934/mbe.2021446 |
[9] | Minkyoung Kim, Soohwan Kim . Dynamics of macroscopic diffusion across meta-populations with top-down and bottom-up approaches: A review. Mathematical Biosciences and Engineering, 2022, 19(5): 4610-4626. doi: 10.3934/mbe.2022213 |
[10] | Haifeng Song, Weiwei Yang, Songsong Dai, Lei Du, Yongchen Sun . Using dual-channel CNN to classify hyperspectral image based on spatial-spectral information. Mathematical Biosciences and Engineering, 2020, 17(4): 3450-3477. doi: 10.3934/mbe.2020195 |
Rumors refer to spontaneously formed false stories. As rumors have shown severe threats to human society, it is significant to curb rumor propagation. Rumor clarification is an effective countermeasure on controlling rumor propagation. In this process, anti-rumor messages can be published through multiple media channels, including but not limited to online social platforms, TV programs and offline face-to-face campaigns. As the efficiency and cost of releasing anti-rumor information can vary from media channel to media channel, provided that the total budget is limited and fixed, it is valuable to investigate how to periodically select a combination of media channels to publish anti-rumor information so as to maximize the efficiency (i.e., make as many individuals as possible know the anti-rumor information) with the lowest cost. We refer to this issue as the dynamic channel selection (DCS) problem and any solution as a DCS strategy. To address the DCS problem, our contributions are as follows. First, we propose a rumor propagation model to characterize the influences of DCS strategies on curbing rumors. On this basis, we establish a trade-off model to evaluate DCS strategies and reduce the DCS problem to a mathematical optimization model called the DCS model. Second, based on the genetic algorithm framework, we develop a numerical method called the DCS algorithm to solve the DCS model. Third, we perform a series of numerical experiments to verify the performance of the DCS algorithm. Results show that the DCS algorithm can efficiently yield a satisfactory DCS strategy.
Rumors refer to spontaneously formed false stories [1]. Benefiting from the wide audience coverage and fast information circulation of social media, rumors can quickly propagate over a social network and compromise a large number of individuals in a short time [2]. If rumor spreading is out of control, severe consequences would occur [3,4]. Hence, it is of significance to curb rumor propagation [5].
Rumor clarification, which means revealing the erroneous aspects of rumors with facts, is one of the most commonly used ways to curb rumor propagation [6]. Generally, the process of rumor clarification consists of the following three steps. First, after rumors have emerged and spread over a social network, the victim of rumors may have a group of righteous journalists (or its public relations department) collect evidence about the facts and write rebuttal reports against the rumors. Second, the victim needs to select a set of media channels (including but not limited to online social media, television programs, short messages and offline face-to-face campaigns) to publish the rebuttal reports. Third, after a certain period of time, the victim may need to re-select the media channels to achieve better results—namely, if most of the audiences of an in-used media channel have acquired the truth, the victim may deactivate this channel and activate other unused channels to make more individuals know the truth. This step can be iteratively performed until everyone on the social network knows the truth. A diagram illustrating the above three steps is shown in Figure 1.
In this paper, we focus on the last two steps of rumor clarification, in which the victim needs to periodically determine which media channels to activate or deactivate so as to expand the ultimate influence of rumor clarification. The victim's decision can be affected by two essential factors: efficiency and cost. On the one hand, the victim has to estimate the efficiency of different combinations of media channels. Research shows that media channels may have different information diffusion efficiency due to the differences in user types, audience ratings and other aspects [7,8,9,10]. Thus, releasing the same rebuttal report through different media channels may result in different effects. On the other hand, the victim needs to consider the costs of different combinations of media channels. As media channels can have different pricing manners for their information exposure services [11], the monetary expenditure of publishing the same rebuttal report can vary from media channel to media channel. Hence, provided that the total budget for rumor clarification is limited and fixed, the victim must consider the costs of different channels.
Considering the above two aspects, we formulate the following issue:
Dynamic Channel Selection (DCS) problem: Consider a process of multiple periods. Under a fixed total budget, how should the victim select proper media channels at each period to publish rebuttal reports, so as to maximize the efficiency (i.e., make as many individuals as possible know the truth) with the lowest actual expenditure?
For writing simplicity, we refer to any solution to the DCS problem as a DCS strategy.
Next, let us analyze the challenges in addressing the DCS problem. In order to find the optimal DCS strategy, the victim must carefully calculate the overall trade-offs of different combinations of media channels in terms of their efficiency and costs. Normally, pricing manners of media channels are open and transparent, so the cost of using any media channel can be calculated easily. However, estimating the collaborative efficiency of multiple media channels is not a low-hanging fruit but the key challenge. Two reasons are as follows. First, because there exists the Word-of-Mouth phenomenon [12] in the process of information diffusion, it is indispensable to microscopically understand how multiple media channels will interact with each other during rumor clarification, which is very complex. Second, as we are considering a multi-period process, we must meticulously determine the timing of choosing a media channel, which is also complicated. In fact, choosing a certain media channel too early or too late may reduce the ultimate efficiency of rumor clarification, and more importantly, the choices in the previous periods may affect the subsequent periods. Therefore, it will take much effort to address the DCS problem. Unfortunately, as far as we know, there is no research on solving the DCS problem. So, our work is of novelty.
Recall that this paper is devoted to addressing the DCS problem. The contributions are as follows.
● We reduce the DCS problem to a mathematical optimization model. First, we propose a rumor propagation model to estimate the effects of different DCS strategies on controlling rumor propagation. Second, with the proposed rumor propagation model, we quantify the trade-offs of different DCS strategies in terms of their efficiency and costs. Third, we formulate an optimization model called the DCS model to describe the DCS problem from a mathematical perspective, with the trade-off model as the objective function and the propagation model as a constraint condition.
● Based on the genetic algorithm framework [13], we develop a numerical method called the DCS algorithm to solve the DCS model. Specifically, we first discuss the designs of the initialization, fitness evaluation, crossover, mutation and repair operators of the genetic algorithm framework, and then provide a pseudo code and an overall flow chart for the DCS algorithm.
● We conduct a series of numerical experiments to verify the performance of the DCS algorithm. First, with a rumor dataset, we estimate the parameter values involved in the proposed rumor propagation model to reconstruct a historical rumor event. Second, we investigate the optimal setting of the DCS algorithm and then explore the contribution degree of each operator of the DCS algorithm. Third, by comparing the DCS algorithm with the Monte Carlo method [14], we validate the effectiveness of the DCS algorithm. Finally, we examine how the obtained optimal strategy can restrain rumor propagation. Results show that the DCS algorithm can efficiently yield a satisfactory DCS strategy.
The remainder of this paper is organized by the following manner. Section 2 reviews the related work and highlights our novelty. Section 3 discusses the mathematical modeling of the DCS problem. Section 4 shows the solution. Section 5 performs massive numerical experiments. Section 6 closes this paper.
In this section, we review the related work and highlight the novelty of our work. First, we briefly introduce the recent research on rumor propagation models. Second, we discuss the existing research on developing rumor clarification strategies.
Rumors refer to spontaneously formed false stories. In order to develop effective anti-rumor countermeasures, it is necessary to first understand the spread process of rumors at a micro level. Normally, mathematical models used to characterize rumor spreading are referred to as rumor propagation models.
Because there are essential similarities between rumors and biological viruses in their infective behaviors, rumor propagation models are generally developed based on the epidemic theory [15], which is primarily used to comprehend the spread process of contagion. Epidemic-based rumor propagation models can be population-level or individual-level. Population-level models (e.g., [16,17]) first classify individuals into several groups according to their stances toward rumors, and then capture the population evolution of each group with a dynamic system. In this type of model, there is a basic assumption that individuals on a social network can be considered completely consistent. However, as social networks are assumed to be homogeneously mixed, population-level models cannot well characterize the interactions between individuals and thus are not accurate enough.
To enhance the accuracy, individual-level models (e.g., [18,19]) take into account the topological structures of social networks and regard every individual as an independent entity. Based on this characteristic, researchers can perform fine-grained simulations on social networks to predict the trend of rumor propagation. Particularly, there are some outstanding individual-level models developed based on machine learning and game theory. In [20], a rumor propagation model is proposed based on data enhancement and evolutionary game. In [21], a game-based rumor diffusion model is designed inspired by image restoration. [22] proposes an information dissemination model to predict the influences of rumors, anti-rumors, and stimulate-rumors by considering their interactions. Because individual-level models can characterize any type of social networks, individual-level models are generally considered more accurate and universal than population-level models.
Unfortunately, as far as we know, there exists no individual-level model on characterizing the interactions between multiple media channels. In this paper, we fill this research gap.
Clarifying the truth to the public has been considered one of the most efficient approaches to rumor propagation containment. In recent years, how to develop cost-effective clarification strategies has attracted much attention from academic communities. In terms of the number of media channels exploited for releasing anti-rumor messages, existing clarification strategies can be classified into two categories: single-channel clarification strategies and multi-channel clarification strategies.
Single-channel clarification strategies are those with which the truth is released through only one (or one type of) social media channel, which is generally represented by Twitter or Facebook. Research of single-channel clarification strategies has not considered the impact of exploiting multiple media channels, or believe that all types of media channels (including but not limited to online social platforms, television programs and face-to-face interactions) can be abstractedly combined to be a sole "global" entity, through which all individuals in society can be directly affected by anti-rumor messages. Accordingly, instead of characterizing the differentiation of various media channels, studies on single-channel clarification strategies focus more on optimizing the rate at which anti-rumor messages are published through the only channel. See [23,24,25,26,27,28] for some typical works.
However, single-channel models cannot well characterize the real-world process of rumor clarification. The primary reason is that in reality there does not exist such a perfect global media channel which can completely cover all individuals worldwide. Even the most popular media channel at present, i.e., online social platforms, just has a usage ratio of no more than 57% [29]. Hence, single-channel clarification strategies are relatively not comprehensive.
In order to make up for the deficiency of single-channel models in depicting the real world, research of multi-channel strategies is devoted to consider the influences of various media channels. In multi-channel rumor propagation models, each channel has its own attributes of information diffusion, such as the forwarding rate of messages, the coverage range of audience and so on [30]. In this context, research on multi-channel clarification focuses more on addressing the so-called rumor influence minimization problem, that is, to select proper clarification channels to accelerate and expand the spreading of anti-rumor information in competition with rumors. See [31,32,33,34,35,36] for typical literature.
Unfortunately, in the existing works on solving the rumor influence minimization problem, strategies are generally assumed to be static over time. That is, in their mathematical models, the selection of clarification channels is considered a one-off act which happens only at the initial stage. However, this assumption makes the obtained clarification strategies not flexible enough in reality, because clarification channels cannot be re-selected dynamically over time according to the latest situation of rumor propagation. Therefore, it is valuable to consider multi-stage channel selection problems and develop corresponding dynamic strategies.
In this paper, we are devoted to filling the above-mentioned research gap by studying the dynamic selection strategies for clarification channels. As far as we know, this is the first time to make such an attempt.
This section discusses the mathematical modeling of the DCS problem. First, we introduce a set of terms and notations to formalize DCS strategies with a mathematical expression. Second, we propose a rumor propagation model to describe the influences of DCS strategies on rumor containment. Third, with the propagation model, we establish a trade-off model to evaluate different DCS strategies and, on this basis, formulate a mathematical optimization problem to describe the DCS problem, with DCS strategies as the decision variable, the trade-off model as the objective function and the rumor propagation model as a constraint condition.
Let us begin by the formalization of DCS strategies. Consider a social network of N individuals. Denote the set of them by VI={vI1,…,vIN}. For a pair of individuals vIi and vIj, let aji=1 if and only if vIi is a social follower of vIj; otherwise, aji=0. Particularly, let aii=0 for all i. Let a=[aij]N×N. Suppose there are M media channels on the network. Let VC={vC1,…,vCM} denote the set of them. If the individual vIi can be directly affected by the channel vCj, denote bij=1; otherwise, bij=0. Let b=[bij]N×M denote the relationship matrix between individuals and media channels.
Suppose when refuting rumors, media channels can be periodically activated or deactivated to publish anti-rumor information on the social network. Let τ be the time interval between any two times of channel selection. Each time interval tk=[(k−1)τ,kτ) is called a stage, where k=1,…,K and K is the maximum number of stages. Denote a binary matrix x=[xkj]K×M such that xkj=1 if and only if the channel vCj is activated at the stage tk; otherwise, xkj=0. In this paper, the matrix x is referred to as the DCS strategy.
Any available DCS strategy should be limited within a pair of upper and lower bounds. In practice, we must take into account the total expenditure of using media channels to clarify the truth. Denote cj as the average cost of using the channel vCj at one stage. Let c=(c1,…,cM). Denote B as the total budget. Because the total expenditure must be lower than the total budget, it holds that ∑Kk=1∑Mj=1cjxkj≤B. Hence, the feasible set of DCS strategies is
X={x=[xkj]K×M | xkj∈{0,1}, k=1,…,K, j=1,…,M, K∑k=1M∑j=1cjxkj≤B}. | (3.1) |
Having defined the feasible set X in (3.1) for DCS strategies, we now need to establish a quantitative model to evaluate the influences of different DCS strategies so that we can have a criterion to select the best DCS strategy from the feasible set X.
Intuitively, the performance of a rumor-containment strategy can be represented by the evolution of individuals' stances toward rumors—the better the strategy, the more people oppose rumors. Hence, if we intend to evaluate the influence of a strategy, we may need first to predict how individuals' stances will evolve under that strategy. In the following, we use a rumor propagation model to capture the effect of a DCS strategy on the changes in individuals' stances.
Establishing a rumor propagation model requires the following three steps [37]: (a) specifying all possible individual stances to rumors; (b) introducing assumptions for all possible stance transitions; (c) formulating a differential dynamic system that characterizes the evolution of individuals' stances. Below, we discuss these three steps.
First, we specify all possible individual stances to rumors. Suppose each individual can have three possible stances to rumors: supportive, opposed and judgment-reserved, which indicate the individual agrees, disagrees and neither agrees nor disagrees with existing rumors, respectively. In this paper, we assume that individual stances are time-varying stochastic variables. Denote Si(t), Oi(t) and Ji(t) as the probabilities with which the individual vIi holds the supportive, opposed and judgment-reserved stances at time t, respectively. Then, the function Pi(t)=(Si(t),Oi(t),Ji(t)) defined on time t≥0 is called the stance probability distribution function of the individual vIi.
Second, we introduce the following notations to estimate the evolution of stance probability distribution functions:
● α: the average rate at which a judgment-reserved individual becomes rumor-opposed due to the persuasion of a rumor-opposed social friend.
● β: the average rate at which a judgment-reserved individual becomes rumor-supportive due to the persuasion of a rumor-supportive social friend.
● γ: the average rate at which a rumor-supportive individual becomes rumor-opposed due to the persuasion of a rumor-opposed social friend.
● δi: the average rate at which a judgment-reserved or rumor-supportive individual becomes rumor-opposed due to the rumor clarification from the channel vCi. Let δ=(δ1,…,δM).
Besides, we introduce the following three assumptions, which have been widely adopted in other individual-level rumor propagation models (e.g., [34,38,39,40,41]).
● The overall influence of the persuasion from multiple social friends on a person's stance can be linearly accumulated by the influence of each friend.
● The overall influence of the clarification from multiple media channels on a person's stance can be linearly accumulated by the influence of each channel.
● The overall influence of the persuasion from social friends and clarification from media channels on a person's stance can be linearly accumulative.
Then, combining the above notations and assumptions, we formulate a differential dynamic system, which is given in Theorem 1, to capture the influence of a DCS strategy on stance probability distribution functions Pi(t), i=1,…,N. This result is obtained by directly applying the epidemic theory (see [37] for an introduction to the epidemic theory).
Theorem 1. Given the initial values Pi(0)=P0i, i=1,…,N, stance probability distribution functions Pi(t), i=1,…,N, t≥0, can be characterized by the dynamic system (3.2).
{dJidt(t)=−Ji(t)[βN∑j=1aijSj(t)+αN∑j=1aijOj(t)+M∑j=1bijδjuj(t)], t≥0, i=1,…,N,dSidt(t)=Ji(t)βN∑j=1aijSj(t)−Si(t)[γN∑j=1aijOj(t)+M∑j=1bijδjuj(t)], t≥0, i=1,…,N,dOidt(t)=Ji(t)αN∑j=1aijOj(t)+Si(t)γN∑j=1aijOj(t)+[Ji(t)+Si(t)]M∑j=1bijδjuj(t), t≥0, i=1,…,N, | (3.2) |
where
uj(t)=xkj, ift∈tk=[(k−1)τ,kτ), j=1,…,M. | (3.3) |
Proof. According to the individual-level epidemic theory (see [37] for a basic introduction and [34,38,39] for some representative applications), the evolution of stance probability distribution can be modeled as a continuous-time Markov process. Hence, we derive the dynamic system (3.2) from the perspective of constructing a Markov process.
First, we calculate the transition rates among all individual stances. Based on the assumptions introduced earlier, the following three transition rates can be obtained: (a) at any time t, the total transition rate at which a judgment-reserved individual vIi becomes rumor-opposed is λJOi(t)=α∑Nj=1aijOj(t)+∑Mj=1bijδjuj(t); (b) at any time t, the total transition rate at which a judgment-reserved individual vIi becomes rumor-supportive is λJSi(t)=β∑Nj=1aijSj(t); (c) at any time t, the total transition rate at which a rumor-supportive individual vIi becomes rumor-opposed is λSOi(t)=γ∑Nj=1aijOj(t)+∑Mj=1bijδjuj(t).
Second, given a very small time interval Δt, we calculate the stance probability distribution at time t+Δt for any time t and for any individual i. Let Ri(t)=RJ, Ri(t)=RS and Ri(t)=RO denote the events that the individual vIi holds the judgment-reserved, rumor-supportive and rumor-opposed stances at time t, respectively. Then, according to the definition of conditional probabilities, the three total transition rates obtained from the first step can yield the following transition probabilities
{Pr[Ri(t+Δt)=RS | Ri(t)=RJ]=λJSi(t)Δt+o(Δt), t≥0, i=1,…,N,Pr[Ri(t+Δt)=RO | Ri(t)=RJ]=λJOi(t)Δt+o(Δt), t≥0, i=1,…,N,Pr[Ri(t+Δt)=RO | Ri(t)=RS]=λSOi(t)Δt+o(Δt), t≥0, i=1,…,N. | (3.4) |
According to Total Probability Formula, for all i=1,…,N and t≥0, the following results can be derived:
{Si(t+Δt)=Ji(t)λJSi(t)Δt+Si(t)[1−λSOi(t)Δt]+Oi(t)⋅0,Oi(t+Δt)=Ji(t)λJOi(t)Δt+Si(t)λSOi(t)Δt+Oi(t)⋅1,Ji(t+Δt)=1−Si(t+Δt)−Oi(t+Δt). | (3.5) |
Third, based on the first two steps, we derive a dynamic system for stance probability distribution functions. By the definition of differential equations, there are
dJidt(t)=limΔt→0Ji(t+Δt)−Ji(t)Δt,dSidt(t)=limΔt→0Si(t+Δt)−Si(t)Δt,dOidt(t)=limΔt→0Oi(t+Δt)−Oi(t)Δt, | (3.6) |
for all i=1,…,N and t≥0. By direct calculation, the dynamic system (3.2) is obtained. The proof is completed.
The dynamic system (3.2) is an individual-level rumor propagation model, based on which we can predict the stance probability distribution for all time and individuals and further quantify the efficiency of different DCS strategies. A diagram of possible stance transitions is shown in Figure 2.
Next, we need to establish a criterion to evaluate different DCS strategies. With respect to a given DCS strategy, a proper criterion must calculate the overall trade-off between the total expenditure of conducting this strategy and the efficiency of this strategy in curbing rumor propagation. Let us discuss these two aspects. First, by definition, the total expenditure of the strategy x is calculated as y1(x)=∑Kk=1∑Mj=1cjxkj. Second, as the goal of rumor clarification is to increase rumor-opposed individuals as many as possible, the effectiveness of the strategy x is represented by the expected number of increased rumor-opposed individuals during rumor clarification, that is, y2(x)=∑Ni=1Oi(Kτ)−∑Ni=1Oi(0). Then, combining the above two aspects, the cost-effectiveness of the strategy x is calculated as the trade-off between the effectiveness and monetary expenditure of the strategy, i.e.,
y(x)=ωy2(x)−y1(x)=w(N∑i=1Oi(Kτ)−N∑i=1Oi(0))−K∑k=1M∑j=1cjxkj, | (3.7) |
where ω is a weight coefficient that measures the importance of rumor clarification, which practically represents the financial benefit gained from increasing one rumor-opposed individual.
Combining the above discussions, we formulate an optimization model as shown in (3.8) to describe the DCS problem in a mathematical modeling perspective. For writing convenience, we refer to (3.8) as the DCS model. The DCS model is a K-dim optimization problem with the strategy x as the decision variable, the trade-off criterion (3.7) as the objective function, and the rumor propagation model (3.2) and (3.3) and feasible set (3.1) as constraint conditions. After solving it, the optimal DCS strategy will be attained.
maxx∈X y(x)=w(N∑i=1Oi(Kτ)−N∑i=1Oi(0))−K∑k=1M∑j=1cjxkj{Ji(t), Si(t), Oi(t) satisfy the rumor propagation model (3.2) and (3.3) for all i=1,…,N, t≥0,Pi(0)=P0i, i=1,…,N. | (3.8) |
In addition, to make our mathematical modeling process more clear, we provide a diagram in Figure 3 to illustrate the meanings, derivation and relations of all the equations.
In the previous section, we reduced the DCS problem to a K-dim optimization model (3.8), i.e., the DCS model. In this section, we discuss how to solve it numerically.
Particularly, we apply the genetic algorithm (GA) framework [13] to solve the DCS model (3.8). GA is a heuristic framework commonly used to find satisfactory solutions to complex optimization problems by relying on biologically-inspired operators such as crossover and mutation. In regard to our work, instantiating a GA-based method to solve the DCS model requires completing the following primary steps. First, design an initialization scheme to generate random DCS strategies from the feasible set (3.1). Regarding the jargon of the GA framework, each DCS strategy is referred to as a chromosome, and a certain scale of candidate chromosomes together form a population, which needs to iteratively evolve to cover more high-quality chromosomes until a certain number of iteration steps. Second, design a fitness evaluation scheme as a criterion to select high-quality chromosomes from the existing population. Third, design a crossover operator to generate two new chromosomes from a pair of ones in the population. Next, design a mutation operator to generate a new chromosome from an existing one. Finally, design a repair operator to ensure the chromosomes after crossover and mutation will still keep feasible, i.e., satisfying the feasible set (3.1). The details of the above steps are as follows.
First, let us focus on the initialization scheme of our GA-based method. An initialization scheme generates a random DCS strategy from the feasible set (3.1). As [42] reports, the most important thing in population initialization is to maintain good diversity of the yielded chromosomes to prevent premature convergence, and thus a good initialization scheme should make the resulting chromosomes uniformly distributed throughout the whole feasible set. This condition can be well achieved by applying standard random number generators (RNGs) [43]. Besides, we need to ensure that every yielded chromosome satisfies the total budget constraint ∑Kk=1∑Mj=1cjxkj≤B defined in the feasible set (3.1).
Hence, in the initialization scheme, we repeatedly generate a (K×M)-dimensional uniformly random binary matrix x by using standard uniform RNGs, and then accept the matrix as a chromosome if the matrix satisfies the condition ∑Kk=1∑Mj=1cjxkj≤B. The corresponding pseudocode is shown in Algorithm 1.
Algorithm 1 Initialization |
Output: A feasible strategy x. |
1: repeat |
2: Generate a (K×M)-dim uniformly random binary matrix x by using standard uniform RNGs [43]; |
3: until ∑Kk=1∑Mj=1cjxkj≤B |
4: return x. |
Next, we focus on the fitness evaluation of DCS strategies. A fitness function measures the quality of different DCS strategies. The higher the fitness, the more satisfactory the strategy is. With a proper fitness function, GA can eliminate low-quality strategies and reserve high-quality strategies. Normally, the fitness of a strategy x can be directly represented by its cost-effectiveness function y(x), i.e., F(x)=y(x).
Next, we discuss the crossover operator. The crossover operator of GA is a mechanism to generate new strategies (i.e., children) from a pair of existing ones (i.e., parents) by exchanging their elements. With the crossover operator, GA can find the optimal strategy with a relatively-large probability. In this paper, we adopt the standard uniform crossover operator [13]. Specifically, for a pair of strategies x1 and x2, the crossover operator exchanges each pair of elements of the two matrices, i.e., x1kj and x2kj, with the same probability. The corresponding pseudocode is shown in Algorithm 2.
Algorithm 2 Crossover |
Input: Probability p, a pair of strategies x1 and x2. |
Output: Two new strategies x1′ and x2′. |
1: for k=1:K do |
2: for j=1:M do |
3: Get a random number q from [0,1]; |
4: if q<p then |
5: Swap x1kj and x2kj; |
6: end if |
7: end for |
8: end for |
9: return x1 and x2. |
Next, we discuss the mutation operator. The mutation operator of GA is a mechanism to generate a new strategy from an existing one such that GA can find the globally-optimal strategy with a certain probability. In this paper, we adopt the standard uniform mutation operator [13]. Specifically, for an existing strategy x, with the same probability, the mutation operator replaces each element of the strategy, i.e., xkj, with 0 or 1 uniformly. The corresponding pseudocode is shown in Algorithm 3.
Algorithm 3 Mutation |
Input: Probability p, a strategy x. |
Output: A new strategy x′. |
1: for k=1:K do |
2: for j=1:M do |
3: Get a random number q from [0,1]; |
4: if q<p then |
5: Get a random number r from {0,1}; |
6: xkj←r; |
7: end if |
8: end for |
9: end for |
10: return x. |
Finally, we discuss the repair operator. Recall that after crossover and mutation, the population may contain unfeasible chromosomes which do not satisfy the linear inequality constraint ∑Kk=1∑Mj=1cjxkj≤B defined in the feasible set (3.1). Therefore, we need to repair these unfeasible chromosomes.
As discussed in [44], a proper way to repair an unfeasible chromosome in constrained optimization is to replace the unfeasible chromosome with its nearest feasible one. Denote ˜x as an unfeasible chromosome. Denote ||⋅||2 as the Euclidean distance. Then, searching the nearest feasible chromosome for the unfeasible chromosome ˜x can be reduced to the following optimization problem:
minx ||x−˜x||2s.t. xkj∈{0,1}, k=1,…,K, j=1,…,M, K∑k=1M∑j=1cjxkj≤B. | (4.1) |
By observing the crossover and mutation operators, we can learn that any chromosomes generated by the initialization scheme will still be 0-1 binary matrices after crossover and mutation no matter they are feasible or unfeasible, because the two operators do not introduce any element value other than 0 and 1. In this context, the optimization problem (4.1) can be easily solved.
Denote ˜x(i) as one of the new chromosomes yielded by changing i elements in ˜x from 1 to 0. For example, if ˜x=[1,1,1], then ˜x(1) can be [0, 1, 1], [1, 0, 1], or [1, 1, 0]. Denote I=∑Kk=1∑Mj=1~xkj as the number of elements with a value of 1 in ˜x. Then, the corresponding pseudocode to solve the optimization model (4.1) is shown in Algorithm 4, followed by a proof of the correctness. In addition, Figure 4 shows a diagram of the repair operator.
Algorithm 4 Repair |
Input: An unfeasible chromosome ˜x. |
Output: A feasible chromosome x closest to ˜x on Euclidean distance. |
1: Calculate I=∑Kk=1∑Mj=1~xkj; |
2: for i=0:1:I do |
3: Calculate all the possible ˜x(i); |
4: for each ˜x(i) do |
5: // Validate if the ˜x(i) is feasible. If yes, return it as the result; otherwise, check the next ˜x(i). |
6: if ∑Kk=1∑Mj=1cj˜x(i)kj≤B then |
7: return ˜x(i). |
8: end if |
9: end for |
10: end for |
Theorem 2. The result of Algorithm 4 is a solution to the optimization model (4.1).
Proof. Recall that any unfeasible chromosome is a 0-1 binary matrix. Then, it is clear that ||˜x−˜x(i)||2=√i, and thus
||˜x−˜x(0)||2≤||˜x−˜x(1)||2≤⋯≤||˜x−˜x(I)||2. | (4.2) |
Because Algorithm 4 scans all the possible ˜x(i) with the increment of i to check if ˜x(i) is feasible, the result of Algorithm 4 must have the shortest Euclidean distance to the unfeasible chromosome ˜x. The proof is complete.
After having designed the above operators, we now are ready to apply GA to solve the DCS model (3.8). Combining the above descriptions, we provide a full view of our GA-based method in Algorithm 5, which we refer to as the DCS algorithm for writing simplicity. By applying the DCS algorithm, we are able to find satisfactory DCS strategies. In addition, we show a diagram of the DCS algorithm in Figure 5.
Algorithm 5 DCS algorithm |
Input: Population size NP, crossover probability pC, mutation probability pM, maximum number of iteration Q. |
Output: A satisfactory strategy x∗. |
1: // Generate NP random strategies x1,…,xNP and calculate their fitness F(xi) |
2: for i=1:NP do |
3: xi← Initialization(); |
4: Calculate the fitness F(xi)=y(xi) by using the trade-off model (3.7); |
5: end for |
6: // Main iteration |
7: for m=1:Q do |
8: // Select high-quality strategies by using the classical roulette-wheel selection operator [13] |
9: (x1,…,xNP)← RouletteWheel(F(x1),…,F(xNP)); |
10: // Crossover |
11: for i=1:NP/2, i=i+2 do |
12: (xi,xi+1)← Crossover(pC,xi,xi+1); |
13: end for |
14: // Mutation and repair |
15: for i=1:NP do |
16: xi← Mutation(pM,xi); |
17: if ∑Kk=1∑Mj=1cjxikj>B then |
18: xi← Repair(xi); |
19: end if |
20: end for |
21: // Fitness calculation |
22: Calculate the fitness F(xi)=y(xi) by using the trade-off model (3.7); |
23: end for |
24: x∗←argmaxx=x1,…,xNPF(x); |
25: return x∗. |
In this section, we verify the performance of the DCS algorithm with numerical experiments. First, with a rumor dataset, we estimate the parameter values of the proposed rumor propagation model to reconstruct a historical rumor event. Second, we investigate the optimal setting of the DCS algorithm and explore the distribution degree of each operator of the DCS algorithm. Third, we validate the effectiveness of the DCS algorithm by comparing it with the Monte Carlo method [14]. Finally, we examine how the obtained optimal strategy can restrain rumor propagation.
Let us begin by estimating the three primary parameters of the proposed rumor propagation (3.2): α, β and γ. To this end, we introduce a rumor dataset called NERT (Newly Emerged Rumors in Twitter) [45], which has been widely used in other rumor-related research. NERT is the result of an empirical study on the spreading process of newly emerged rumors in Twitter. Specifically, it collects rumor-related tweets during a rumor event whose topic is about "A screenshot from MyLife.com confirms that mail bomb suspect Cesar Sayoc was registered as a Democrat". In the dataset, each row represents a tweet associated with the rumor topic, and each column explains an attribute of the tweet, such as the user ID, the date and time when the tweet is published, and the stance of the tweet.
On one hand, by using the method in [2], from the dataset we can extract the proportions of different categories of individuals for every time interval during a finite time horizon. Denote each time interval by Ti. Denote the proportions of judgment-reserved, rumor-supportive and rumor-opposed individuals at the time interval Ti by ˉJ(Ti), ˉS(Ti) and ˉO(Ti), respectively. On the other hand, in our rumor propagation model, the expected proportions of judgment-reserved, rumor-supportive and rumor-opposed individuals at time t are calculated by
˜J(t)=N∑i=1Ji(t),˜S(t)=N∑i=1Si(t),˜O(t)=N∑i=1Ji(t), | (5.1) |
respectively. Hence, the optimal estimation of the parameters α, β and γ should make the following conditions hold true as much as possible:
ˉJ(Ti)=˜J(Ti),ˉS(Ti)=˜S(Ti),ˉO(Ti)=˜O(Ti),∀i. | (5.2) |
To evaluate the goodness of the three parameters, we define the following Sum-of-Squares-due-to-Error (SSE) equation
SSE(α,β,γ)=∑i[(ˉJ(Ti)−˜J(Ti))2+(ˉS(Ti)−˜S(Ti))2+(ˉO(Ti)−˜O(Ti))2]. | (5.3) |
Then, the optimal-estimated parameters can be attained by solving
(α∗,β∗,γ∗)=argminSSE(α,β,γ). | (5.4) |
Consider the experiment settings as follows. Let 6 hours be one unit time. Let each time interval Ti be 10 minutes. From the NERT dataset, we extract the proportion curves for a 24-hour time duration from 04:00 on Oct. 27th to 04:00 on Oct. 28th, 2018. After iterating each parameter from the space {0.002,…,1}, we attain the optimal-estimated parameters α∗=0.060, β∗=0.088, γ∗=0.006. Figure 6 compares the real and estimated proportion curves, from which it is seen that our rumor propagation model can well approximate the real-world situation.
Besides, let us make the following assumptions for other model parameters:
● The relationship matrix between individuals and channels, b: In practice, this matrix depends on the actual situation. In our experiments, we set b by an arbitrary randomly-generated matrix in which each element is set by 1 with a probability of 0.3.
● The channel-activating costs c: As reported by [46], launching an ads campaign will averagely cost about 2 to 4 dollars per audience. Because the number of connected individuals of the channel vCj is ∑Ni=1bij, the cost cj is therefore calculated by cj=rc∑Ni=1bij, where 2≤rc≤4 is a random number.
● The spreading rates of clarification channels, δ: In our experiments, we set each δj empirically by a random number such that δj∈[0.1,0.3].
● The average benefit rates per individual, ω: In our experiments, we set ω=40 empirically.
Next, we investigate the optimal setting of the DCS algorithm. Because the DCS algorithm is based on the GA framework, there are three crucial parameters that can dramatically affect the effectiveness of the DCS algorithm. They are the population size NP, crossover probability pC and mutation probability pM. In this subsection, we determine the optimal setting of the DCS algorithm by trying to set these three parameters with different values and observing the results.
Specifically, we consider the case where τ=0.5, K=8, M=3. Besides, let NP∈{12,24,60}, pC∈{0.1,0.2,0.3,0.4} and pM∈{0.025,0.050,0.075,0.100}. Then, we run the DCS algorithm for every parameter combination with the same iteration steps and observe the performance. Denote y∗ as the trade-off of the DCS strategy obtained from the DCS algorithm. Then, Tables 1–3 show the obtained trade-offs under different crossover and mutation probabilities when the population size is set by NP=16, NP=24 and NP=60, respectively.
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 439.254 | 456.581 | 443.973 | 446.916 |
0.2 | 460.922 | 443.973 | 429.494 | 443.272 |
0.3 | 456.58 | 443.604 | 418.767 | 435.879 |
0.4 | 459.278 | 442.984 | 401.924 | 433.603 |
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 460.922 | 447.156 | 443.761 | 425.238 |
0.2 | 460.922 | 456.579 | 435.534 | 422.586 |
0.3 | 460.922 | 460.922 | 449.446 | 438.425 |
0.4 | 460.922 | 460.922 | 450.772 | 420.510 |
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 460.922 | 456.579 | 460.922 | 460.922 |
0.2 | 460.922 | 460.922 | 460.922 | 449.446 |
0.3 | 460.922 | 456.174 | 456.579 | 459.277 |
0.4 | 460.922 | 460.922 | 460.922 | 446.916 |
From the three tables, we can learn that when the population size is small, the mutation probability is the most important factor, which will dramatically affect the performance of the DCS algorithm. Normally, the smaller the mutation probability, the greater the performance. Thus, we should set the mutation probability as small as possible. Besides, it can be understood that the population size is another key factor of the algorithm performance. With the increase of the population size, the trade-off increases no matter what the crossover and mutation probabilities are. So, in practice, the population size should be set as large as possible while ensuring that the runtime is acceptable. Combining the above discussion, we recommend NP=24, pC=0.3, pM=0.025 as the optimal setting with respect to the case we study.
Next, we validate the effectiveness of the DCS algorithm. Although the GA framework has been proven effective in solving most optimization models [13], we still need to examine whether the solution obtained from the GA-based DCS algorithm can reach global optimality. To achieve that, we compare the DCS algorithm with the Monte Carlo (MC) method [14].
The MC method aims to find the globally optimal solution to an optimization problem by extensively exhausting random feasible solutions. Normally, with the increase of the number of random seed solutions, the maximum performance among all the random seed solutions will gradually approach the globally optimal value. Therefore, if the trade-off obtained by the DCS algorithm can outperform the best trade-off of the MC method, the strategy yielded from the DCS algorithm will probably be the globally optimal one.
Based on the above discussions, we run the MC method with different numbers of random seeds, and compare the MC method with the DCS algorithm in terms of their runtime and trade-offs. Table 4 shows the results. We mention that all the experiments are performed under the same environment. More specifically, all the experiments are conducted by a C++ procedure and the hardware device for computation is a PC machine with 16GB memory and a CPU of AMD 5800x.
Algorithm | MC | MC | MC | MC | MC | MC | DCS |
Number of seeds | 1,000 | 10,000 | 50,000 | 100,000 | 200,000 | 500,000 | N/A |
Trade-off | 411.892 | 428.829 | 443.272 | 443.272 | 443.272 | 443.272 | 460.922 |
Runtime | 0.988s | 9.662s | 48.602s | 1m 35.301s | 3m 3.903s | 8m 2.710s | 0.297s |
From the table, we can learn that the best trade-off as well as the runtime of the MC method increases with the number of random seeds, which exactly satisfies the MC theory. More importantly, the trade-off of the DCS algorithm far exceeds the best trade-off of the MC method. So, we can deduce that the DCS algorithm can probably reach global optimality. Besides, we notice that the runtime of the DCS algorithm is much smaller than that of the MC method. Therefore, the DCS algorithm is more efficient than the MC method.
Finally, we examine how the optimal strategy obtained from the DCS algorithm will influence rumor propagation.
Recall that ˜O(t) and ˜S denote the expected proportions of rumor-opposed individuals and rumor-supportive individuals at time t without rumor clarification, respectively. Denote ˜O∗(t) and ˜S∗(t) as the expected proportions of rumor-opposed individuals and rumor-supportive individuals at time t under the optimal DCS strategy obtained from the DCS algorithm, respectively. Then, Figure 7 compares the proportion curves in terms of the cases with and without the optimal DCS strategy. From the figure, it can be seen that the optimal DCS strategy can dramatically increase rumor-opposed individuals and reduce rumor-supportive individuals. Hence, the optimal DCS strategy is effective in controlling rumor propagation.
In this paper, we have addressed the DCS problem. First, we have proposed a novel rumor propagation model to characterize the influences of different DCS strategies on preventing rumor spreading. On this basis, we have reduced the DCS problem to a mathematical optimization model. Second, we have developed a GA-based numerical method to solve the DCS problem. Third, we have conducted numerical experiments to verify the performances of the developed method.
Still, there are some open problems. First, parameters in our rumor propagation model are assumed as constant coefficients. In fact, because of the trending decay of information topics [47], the influence of a rumor can be decreasing over time. Hence, it would be valuable to extend this work by considering a dynamic rumor spreading rate. Second, in our numerical simulations, some model parameters are set empirically. In possible future research, it would be valuable to consider the accurate estimation of these model parameters.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This research was funded by Chongqing Education Commission Science and Technology Research Project grant number KJQN202103302, Chongqing Higher Vocational Education Teaching Reform Research Project grant number Z213096, Key Projects of the 13th Five-Year Plan for Chongqing Education Science grant number 2020-GX-163.
The authors declare there is no conflict of interest.
[1] |
X. Chen, N. Wang, Rumor spreading model considering rumor credibility, correlation and crowd classification based on personality, Sci. Rep., 10 (2020), 5887. https://doi.org/10.1038/s41598-020-62585-9 doi: 10.1038/s41598-020-62585-9
![]() |
[2] |
Z. Yu, S. Lu, D. Wang, Z. Li, Modeling and analysis of rumor propagation in social networks, Inform. Sci., 580 (2021), 857–873. https://doi.org/10.1016/j.ins.2021.09.012 doi: 10.1016/j.ins.2021.09.012
![]() |
[3] |
S. T. Malamut, M. Dawes, H. Xie, Characteristics of rumors and rumor victims in early adolescence: Rumor content and social impact, Soc. Dev., 27 (2018), 601–618. https://doi.org/10.1111/sode.12289 doi: 10.1111/sode.12289
![]() |
[4] |
P. Meel, D. K. Vishwakarma, Fake news, rumor, information pollution in social media and web: A contemporary survey of state-of-the-arts, challenges and opportunities, Exp. Syst. Appl., 153 (2020), 112986. https://doi.org/10.1016/j.eswa.2019.112986 doi: 10.1016/j.eswa.2019.112986
![]() |
[5] | T. Rana, P. Meel, P. Meel, Rumor propagation: A state-of-the-art survey of current challenges and opportunities, in 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), (2019), 64–69. https://doi.org/10.1109/ICCT46177.2019.8969023 |
[6] | J. A. Tucker, A. Guess, P. Barber, C. Vaccari, A. Siegel, S. Sanovich, et al., Social media, political polarization, and political disinformation: A review of the scientific literature, Political Polariz. Political Disinform., 2018. |
[7] |
S. S. Ho, A. D. Leong, J. Looi, A. S. Chuah, Online, offline, or word-of-mouth? Complementary media usage patterns and credibility perceptions of nuclear energy information in Southeast Asia, Energy Res. Soc. Sci., 48 (2019), 46–56. https://doi.org/10.1016/j.erss.2018.09.012 doi: 10.1016/j.erss.2018.09.012
![]() |
[8] |
B. M. Okdie, R. E. Guadagno, F. J. Bernieri, A. L. Geers, A. R. Mclarney-Vesotski, Getting to know you: Face-to-face versus online interactions, Comput. Human Behav., 27 (2011), 153–159. https://doi.org/10.1016/j.chb.2010.07.017 doi: 10.1016/j.chb.2010.07.017
![]() |
[9] |
M. Paechter, B. Maier, Online or face-to-face? Students' experiences and preferences in e-learning, Int. Higher Educ., 13 (2010), 292–297. https://doi.org/10.1016/j.iheduc.2010.09.004 doi: 10.1016/j.iheduc.2010.09.004
![]() |
[10] |
M. Dohen, J. Schwartz, G. Bailly, Speech and face-to-face communication–An introduction, Speech Commun., 52 (2010), 477–480. https://doi.org/10.1016/j.specom.2010.02.016 doi: 10.1016/j.specom.2010.02.016
![]() |
[11] | M. Gollin, How much do social media ads cost on Facebook, Instagram, Twitter, and LinkedIn?, 2022. Available from: https://www.brandwatch.com/blog/how-much-do-social-media-ads-cost-on-facebook-instagram-twitter-and-linkedin/ |
[12] | J. Kostka, Y. A. Oswald, R. Wattenhofer, Word of mouth: Rumor dissemination in social networks, in Structural Information and Communication Complexity: 15th International Colloquium, SIROCCO 2008 Villars-sur-Ollon, Springer, (2008), 185–196. https://doi.org/10.1007/978-3-540-69355-0_16 |
[13] |
S. Katoch, S. S. Chauhan, V. Kumar, A review on genetic algorithm: past, present, and future, Multimedia Tools Appl., 80 (2021), 8091–8126. https://doi.org/10.1007/s11042-020-10139-6 doi: 10.1007/s11042-020-10139-6
![]() |
[14] |
D. P. Kroese, T. Brereton, T. Taimre, Z. I. Botev, Why the Monte Carlo method is so important today, Wiley Int. Rev. Comput. Stat., 6 (2014), 386–392. https://doi.org/10.1002/wics.1314 doi: 10.1002/wics.1314
![]() |
[15] |
V. Capasso, G. Serio, A generalization of the Kermack-McKendrick deterministic epidemic model, Math. Biosci., 42 (1978), 43–61. https://doi.org/10.1016/0025-5564(78)90006-8 doi: 10.1016/0025-5564(78)90006-8
![]() |
[16] |
P. Wan, X. Wang, X. Wang, L. Wang, Y. Lin, W. Zhao, Intervening coupling diffusion of competitive information in online social networks, IEEE Trans. Knowl. Data Eng., 33 (2019), 2548–2559. https://doi.org/10.1109/TKDE.2019.2954901 doi: 10.1109/TKDE.2019.2954901
![]() |
[17] |
X. Wang, X. Wang, F. Hao, G. Min, L. Wang, Efficient coupling diffusion of positive and negative information in online social networks, IEEE Trans. Network Serv. Manage., 16 (2019), 1226–1239. https://doi.org/10.1109/TNSM.2019.2917512 doi: 10.1109/TNSM.2019.2917512
![]() |
[18] |
F. Liu, M. Buss, Optimal control for heterogeneous node-based information epidemics over social networks, IEEE Trans. Control Network Syst., 7 (2020), 1115–1126. https://doi.org/10.1109/TCNS.2019.2963488 doi: 10.1109/TCNS.2019.2963488
![]() |
[19] |
L. Yang, T. Zhang, X. Yang, Y. Wu, Y. Y. Tang, Effectiveness analysis of a mixed rumor-quelling strategy, J. Franklin Inst., 355 (2018), 8079–8105. https://doi.org/10.1016/j.jfranklin.2018.07.040 doi: 10.1016/j.jfranklin.2018.07.040
![]() |
[20] |
Y. Xiao, W. Li, S. Qiang, Q. Li, H. Xiao, Y. Liu, A rumor & anti-rumor propagation model based on data enhancement and evolutionary game, IEEE Trans. Emerging Top. Comput., 10 (2020), 690–703. https://doi.org/10.1109/TETC.2020.3034188 doi: 10.1109/TETC.2020.3034188
![]() |
[21] |
Y. Xiao, Z. Huang, Q. Li, X. Lu, T. Li, Diffusion pixelation: A game diffusion model of rumor & anti-rumor inspired by image restoration, IEEE Trans. Knowl. Data Eng., 35 (2022), 4682–4694. https://doi.org/10.1109/TKDE.2022.3144310 doi: 10.1109/TKDE.2022.3144310
![]() |
[22] |
Q. Li, T. Xiang, T. Dai, Y. Xiao, An information dissemination model based on the rumor & anti-rumor & stimulate-rumor and tripartite cognitive game, IEEE Trans. Cognit. Dev. Syst., 15 (2022), 925–937. https://doi.org/10.1109/TCDS.2022.3193576 doi: 10.1109/TCDS.2022.3193576
![]() |
[23] |
C. Pan, L. Yang, X. Yang, Y. Wu, Y. Y. Tang, An effective rumor-containing strategy, Phys. A Stat. Mech. Appl., 500 (2018), 80–91. https://doi.org/10.1016/j.physa.2018.02.025 doi: 10.1016/j.physa.2018.02.025
![]() |
[24] |
P. Wan, X. Wang, X. Wang, L. Wang, Y. Lin, W. Zhao, Intervening coupling diffusion of competitive information in online social networks, IEEE Trans. Knowl. Data Eng., 33 (2019), 2548–2559. https://doi.org/10.1109/TKDE.2019.2954901 doi: 10.1109/TKDE.2019.2954901
![]() |
[25] |
Y. Lin, X. Wang, F. Hao, Y. Jiang, Y. Wu, G. Min, et al., Dynamic control of fraud information spreading in mobile social networks, IEEE Trans. Syst. Man, Cybern., 51 (2019), 3725–3738. https://doi.org/10.1109/TSMC.2019.2930908 doi: 10.1109/TSMC.2019.2930908
![]() |
[26] |
F. Liu, M. Buss, Optimal control for heterogeneous node-based information epidemics over social networks, IEEE Trans. Control Network Syst., 7 (2020), 1115–1126. https://doi.org/10.1109/TCNS.2019.2963488 doi: 10.1109/TCNS.2019.2963488
![]() |
[27] |
J. Chen, L. Yang, X. Yang, Y. Y. Tang, Cost-effective anti-rumor message-pushing schemes, Phys. A Stat. Mech. Appl., 540 (2020), 123085. https://doi.org/10.1016/j.physa.2019.123085 doi: 10.1016/j.physa.2019.123085
![]() |
[28] |
S. Wen, J. Jiang, Y. Xiang, S. Yu, W. Zhou, W. Jia, To shut them up or to clarify: Restraining the spread of rumors in online social networks, IEEE Trans. Parallel Distrib. Syst., 25 (2014), 3306–3316. https://doi.org/10.1109/TPDS.2013.2297115 doi: 10.1109/TPDS.2013.2297115
![]() |
[29] | M. Mohsin, Ten social media statistics you need to know in 2022, 2022. Available from: https://www.oberlo.com/blog/social-media-marketing-statistics. |
[30] | N. Kin Wai, S. Horawalavithana, A. Iamnitchi, Multi-platform Information Operations: Twitter, Facebook and YouTube against the White Helmets, in Proceedings of The Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media (ICWSM), 2021. |
[31] |
D. A. Vega-Oliveros, L. da Fontoura Costa, F. A. Rodrigues, Influence maximization by rumor spreading on correlated networks through community identification, Commun. Nonlinear Sci. Numer. Simul., 83 (2020), 105094. https://doi.org/10.1016/j.cnsns.2019.105094 doi: 10.1016/j.cnsns.2019.105094
![]() |
[32] |
J. Chen, N. Wei, H. Yang, Immune Algorithm to Suppress Rumor Propagation Based on Influence Maximization, Secur. Commun. Networks, 2022 (2022). https://doi.org/10.1155/2022/6785828 doi: 10.1155/2022/6785828
![]() |
[33] |
K. Tanınmış, N. Aras, İ. Kuban Altınel, E. Güney, Minimizing the misinformation spread in social networks, Iise Trans., 52 (2020), 850–863. https://doi.org/10.1080/24725854.2019.1680909 doi: 10.1080/24725854.2019.1680909
![]() |
[34] |
L. Li, K. Huang, X. Yang, Containing Misinformation Spread: A Collaborative Resource Allocation Strategy for Knowledge Popularization and Expert Education, Secur. Commun. Networks, 2022 (2022), 1–14. https://doi.org/10.1155/2022/4510694 doi: 10.1155/2022/4510694
![]() |
[35] |
J. Zhu, P. Ni, G. Wang, Y. Li, Misinformation influence minimization problem based on group disbanded in social networks, Inform. Sci., 572 (2021), 1–15. https://doi.org/10.1016/j.ins.2021.04.086 doi: 10.1016/j.ins.2021.04.086
![]() |
[36] |
P. Ni, J. Zhu, G. Wang, Misinformation influence minimization by entity protection on multi-social networks, Appl. Intell., 0 (2022), 1–20. https://doi.org/10.1007/s10489-022-03798-5 doi: 10.1007/s10489-022-03798-5
![]() |
[37] |
L. Zino, M. Cao, Analysis, prediction, and control of epidemics: A survey from scalar to dynamic network models, IEEE Circuits Syst. Mag., 21 (2021), 4–23. https://doi.org/10.1109/MCAS.2021.3118100 doi: 10.1109/MCAS.2021.3118100
![]() |
[38] |
D. Huang, L. Yang, P. Li, X. Yang, Y. Y. Tang, Developing cost-effective rumor-refuting strategy through game-theoretic approach, IEEE Syst. J., 15 (2020), 5034–5045. https://doi.org/10.1109/JSYST.2020.3020078 doi: 10.1109/JSYST.2020.3020078
![]() |
[39] |
J. Zhao, L. Yang, X. Zhong, X. Yang, Y. Wu, Y. Y. Tang, Minimizing the impact of a rumor via isolation and conversion, Phys. A Stat. Mech. Appl., 526 (2019), 120867. https://doi.org/10.1016/j.physa.2019.04.103 doi: 10.1016/j.physa.2019.04.103
![]() |
[40] |
L. Yang, T. Zhang, X. Yang, Y. Wu, and Y. Y. Tang, Effectiveness analysis of a mixed rumor-quelling strategy, Journal of the Franklin Institute, 355 (2018), 8079–8105. https://doi.org/10.1016/j.jfranklin.2018.07.040 doi: 10.1016/j.jfranklin.2018.07.040
![]() |
[41] |
L. Yang, P. Li, X. Yang, Y. Xiang, Y. Y. Tang, Simultaneous benefit maximization of conflicting opinions: Modeling and analysis, IEEE Syst. J., 14 (2020), 1623–1634. https://doi.org/10.1109/JSYST.2020.2964004 doi: 10.1109/JSYST.2020.2964004
![]() |
[42] | C. Shyalika, An insight to genetic algorithms: Population initialization in genetic algorithms, 2019. Available from: https://medium.datadriveninvestor.com/population-initialization-in-genetic-algorithms-ddb037da6773 |
[43] |
G. Marsaglia, A. Zaman, W. W. Tsang, Toward a universal random number generator, Stat. Probab. Lett., 9 (1990), 35–39. https://doi.org/10.1016/0167-7152(90)90092-L doi: 10.1016/0167-7152(90)90092-L
![]() |
[44] |
D. Bunnag, M. Sun, Genetic algorithm for constrained global optimization in continuous variables, Appl. Math. Comput., 171 (2005), 604–636. https://doi.org/10.1016/j.amc.2005.01.075 doi: 10.1016/j.amc.2005.01.075
![]() |
[45] |
A. Bodaghi, J. Oliveira, The characteristics of rumor spreaders on Twitter: A quantitative analysis on real data, Comput. Commun., 160 (2020), 674–687. https://doi.org/10.1016/j.comcom.2020.07.017 doi: 10.1016/j.comcom.2020.07.017
![]() |
[46] | A. Sonnenberg, How to Run Twitter Ads in 2022, 2022. Available from: https://www.socialmediaexaminer.com/how-to-run-twitter-ads-in-2022/. |
[47] | S. Asur, B. A. Huberman, G. Szabo, C. Wang, Trends in social media: Persistence and decay, in Proceedings of the International AAAI Conference on Web and Social Media, (2011), 434–437. https://doi.org/10.2139/ssrn.1755748 |
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 439.254 | 456.581 | 443.973 | 446.916 |
0.2 | 460.922 | 443.973 | 429.494 | 443.272 |
0.3 | 456.58 | 443.604 | 418.767 | 435.879 |
0.4 | 459.278 | 442.984 | 401.924 | 433.603 |
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 460.922 | 447.156 | 443.761 | 425.238 |
0.2 | 460.922 | 456.579 | 435.534 | 422.586 |
0.3 | 460.922 | 460.922 | 449.446 | 438.425 |
0.4 | 460.922 | 460.922 | 450.772 | 420.510 |
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 460.922 | 456.579 | 460.922 | 460.922 |
0.2 | 460.922 | 460.922 | 460.922 | 449.446 |
0.3 | 460.922 | 456.174 | 456.579 | 459.277 |
0.4 | 460.922 | 460.922 | 460.922 | 446.916 |
Algorithm | MC | MC | MC | MC | MC | MC | DCS |
Number of seeds | 1,000 | 10,000 | 50,000 | 100,000 | 200,000 | 500,000 | N/A |
Trade-off | 411.892 | 428.829 | 443.272 | 443.272 | 443.272 | 443.272 | 460.922 |
Runtime | 0.988s | 9.662s | 48.602s | 1m 35.301s | 3m 3.903s | 8m 2.710s | 0.297s |
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 439.254 | 456.581 | 443.973 | 446.916 |
0.2 | 460.922 | 443.973 | 429.494 | 443.272 |
0.3 | 456.58 | 443.604 | 418.767 | 435.879 |
0.4 | 459.278 | 442.984 | 401.924 | 433.603 |
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 460.922 | 447.156 | 443.761 | 425.238 |
0.2 | 460.922 | 456.579 | 435.534 | 422.586 |
0.3 | 460.922 | 460.922 | 449.446 | 438.425 |
0.4 | 460.922 | 460.922 | 450.772 | 420.510 |
![]() |
0.025 | 0.05 | 0.075 | 0.1 |
0.1 | 460.922 | 456.579 | 460.922 | 460.922 |
0.2 | 460.922 | 460.922 | 460.922 | 449.446 |
0.3 | 460.922 | 456.174 | 456.579 | 459.277 |
0.4 | 460.922 | 460.922 | 460.922 | 446.916 |
Algorithm | MC | MC | MC | MC | MC | MC | DCS |
Number of seeds | 1,000 | 10,000 | 50,000 | 100,000 | 200,000 | 500,000 | N/A |
Trade-off | 411.892 | 428.829 | 443.272 | 443.272 | 443.272 | 443.272 | 460.922 |
Runtime | 0.988s | 9.662s | 48.602s | 1m 35.301s | 3m 3.903s | 8m 2.710s | 0.297s |