Tun Li;Zhou Li;Kexin Ma;Qian Li;Rong Wang;Chaolong Jia;Yunpeng Xiao
{"title":"基于邻域相似性和多类型交互的恶意信息溯源模型","authors":"Tun Li;Zhou Li;Kexin Ma;Qian Li;Rong Wang;Chaolong Jia;Yunpeng Xiao","doi":"10.1109/TCSS.2024.3385025","DOIUrl":null,"url":null,"abstract":"The open and free nature of online platforms presents challenges for tracing malicious information. To address this, we propose a traceability model based on neighborhood similarity and multitype interaction. First, we propose neighborhood similarity algorithms (D-NTC) to address the universality of malicious information dissemination. This algorithm evaluates the impact of user node importance on malicious information propagation by combining node degrees and the topological overlap of neighboring nodes. Second, we consider the interactive nature of multiple types of elements in the network and construct an interactive module based on user-path-malicious information. This module effectively captures the mutual influence relationships among diverse elements. Additionally, we employ representation learning to optimize the transition probability matrix between elements, leveraging hidden relationships to further characterize their interactive impact. Finally, we propose the NSMTI-Rank algorithm, which tackles the complexity of quantifying the influence of multiple types of elements. Drawing inspiration from mutual reinforcement effects, NSMTI-Rank comprehensively quantifies element influence through an iterative framework. Experimental results demonstrate the effectiveness of our approach in mining user node importance and capturing the interaction information among diverse elements in the network. Moreover, it enables the timely and effective identification of sources of malicious information dissemination.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"11 5","pages":"5815-5827"},"PeriodicalIF":4.5000,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Malicious Information Traceability Model Based on Neighborhood Similarity and Multiple Types of Interaction\",\"authors\":\"Tun Li;Zhou Li;Kexin Ma;Qian Li;Rong Wang;Chaolong Jia;Yunpeng Xiao\",\"doi\":\"10.1109/TCSS.2024.3385025\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The open and free nature of online platforms presents challenges for tracing malicious information. To address this, we propose a traceability model based on neighborhood similarity and multitype interaction. First, we propose neighborhood similarity algorithms (D-NTC) to address the universality of malicious information dissemination. This algorithm evaluates the impact of user node importance on malicious information propagation by combining node degrees and the topological overlap of neighboring nodes. Second, we consider the interactive nature of multiple types of elements in the network and construct an interactive module based on user-path-malicious information. This module effectively captures the mutual influence relationships among diverse elements. Additionally, we employ representation learning to optimize the transition probability matrix between elements, leveraging hidden relationships to further characterize their interactive impact. Finally, we propose the NSMTI-Rank algorithm, which tackles the complexity of quantifying the influence of multiple types of elements. Drawing inspiration from mutual reinforcement effects, NSMTI-Rank comprehensively quantifies element influence through an iterative framework. Experimental results demonstrate the effectiveness of our approach in mining user node importance and capturing the interaction information among diverse elements in the network. Moreover, it enables the timely and effective identification of sources of malicious information dissemination.\",\"PeriodicalId\":13044,\"journal\":{\"name\":\"IEEE Transactions on Computational Social Systems\",\"volume\":\"11 5\",\"pages\":\"5815-5827\"},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2024-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Computational Social Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10509577/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, CYBERNETICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Computational Social Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10509577/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, CYBERNETICS","Score":null,"Total":0}
A Malicious Information Traceability Model Based on Neighborhood Similarity and Multiple Types of Interaction
The open and free nature of online platforms presents challenges for tracing malicious information. To address this, we propose a traceability model based on neighborhood similarity and multitype interaction. First, we propose neighborhood similarity algorithms (D-NTC) to address the universality of malicious information dissemination. This algorithm evaluates the impact of user node importance on malicious information propagation by combining node degrees and the topological overlap of neighboring nodes. Second, we consider the interactive nature of multiple types of elements in the network and construct an interactive module based on user-path-malicious information. This module effectively captures the mutual influence relationships among diverse elements. Additionally, we employ representation learning to optimize the transition probability matrix between elements, leveraging hidden relationships to further characterize their interactive impact. Finally, we propose the NSMTI-Rank algorithm, which tackles the complexity of quantifying the influence of multiple types of elements. Drawing inspiration from mutual reinforcement effects, NSMTI-Rank comprehensively quantifies element influence through an iterative framework. Experimental results demonstrate the effectiveness of our approach in mining user node importance and capturing the interaction information among diverse elements in the network. Moreover, it enables the timely and effective identification of sources of malicious information dissemination.
期刊介绍:
IEEE Transactions on Computational Social Systems focuses on such topics as modeling, simulation, analysis and understanding of social systems from the quantitative and/or computational perspective. "Systems" include man-man, man-machine and machine-machine organizations and adversarial situations as well as social media structures and their dynamics. More specifically, the proposed transactions publishes articles on modeling the dynamics of social systems, methodologies for incorporating and representing socio-cultural and behavioral aspects in computational modeling, analysis of social system behavior and structure, and paradigms for social systems modeling and simulation. The journal also features articles on social network dynamics, social intelligence and cognition, social systems design and architectures, socio-cultural modeling and representation, and computational behavior modeling, and their applications.