Maximizing rumor containment in social networks with constrained time

Lidan Fan, Weili Wu, Xuming Zhai, Kai Xing, Wonjun Lee, Ding Zhu Du

    Research output: Contribution to journalArticlepeer-review

    45 Citations (Scopus)

    Abstract

    The spread of rumor or misinformation in social networks may cause bad effects among the public. Thus, it is necessary to find effective strategies to control the spread of rumor. Specifically, in our paper, we consider such a setting: initially, a subset of nodes is chosen as the set of protectors, and the influence of protector diffuses competitively with the diffusion of rumor. However, in real world, we generally have limited budget (limited number of protectors) and time to fight with rumor. Therefore, we study the problem of maximizing rumor containment within a fixed number of initial protectors and a given time deadline. Generalizing two seminal models in the field—the Independent Cascade (IC) model and the Linear Threshold (LT) model—we propose two new models of competitive influence diffusion in social networks with the following three factors: a time deadline for information diffusion, random time delay of information exchange and personal interests regarding the acceptance of information. Under these two models, we show that the optimization problems are NP-hard. Furthermore, we prove that the objective functions are submodular. As a result, the greedy algorithm is used as constant-factor approximation algorithms with performance guarantee $$1-\frac{1}{e}$$1-1e for the two optimization problems.

    Original languageEnglish
    Article number214
    Pages (from-to)1-10
    Number of pages10
    JournalSocial Network Analysis and Mining
    Volume4
    Issue number1
    DOIs
    Publication statusPublished - 2014 Jan 1

    Keywords

    • Influence diffusion
    • Personal interests
    • Rumor containment
    • Time deadline
    • Time delay

    ASJC Scopus subject areas

    • Information Systems
    • Communication
    • Media Technology
    • Human-Computer Interaction
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Maximizing rumor containment in social networks with constrained time'. Together they form a unique fingerprint.

    Cite this