Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment
Citations
185 citations
125 citations
Cites background from "Detecting Rumors Through Modeling I..."
...Additionally, existing approaches have some challenges for MID, e.g. data volume, data quality, domain complexity, interpretability, feature enrichment, model privacy, incorporating expert knowledge, temporal modeling, dynamic, etc. (Liu and Xu 2016; Ma et al....
[...]
105 citations
80 citations
Cites background from "Detecting Rumors Through Modeling I..."
...[102] construct the information dissemination networks based on heterogeneous users’ specific attributes for identifying special dissemination structures of false information....
[...]
76 citations
References
40,826 citations
5,412 citations
"Detecting Rumors Through Modeling I..." refers methods in this paper
...In this paper, we design our information propagation model for differentiating rumors from truthful messages propagated over a social network by extending the IC model because the scenario of microblog propagation in a social network satisfies all the following three key constraints assumed by the IC model [28]....
[...]
4,731 citations
2,450 citations
"Detecting Rumors Through Modeling I..." refers methods in this paper
...Popular probabilistic models established for modeling such an information propagation process include the independent cascade (IC) model [22], [23], the linear threshold model [24], [25], and the voter model [26], [27]....
[...]
2,123 citations
"Detecting Rumors Through Modeling I..." refers background in this paper
...COMPARING THE PERFORMANCE OF THE PROPOSED METHOD WITH THAT OF SVM CLASSIFIERS USING DIFFERENT SETS OF FEATURES [7], INCLUDING 1) MESSAGE-BASED, 2) USER-BASED, 3) PROPAGATION-BASED, AND 4) COMBINED, AS WELL AS TWO PEER METHODS—5) YANG’S [3] AND 6) SUN’S [12], 7) THE REDUCED VERSION AND 8) THE FULL VERSION OF THE PROPOSED METHOD....
[...]
...[7] in their Twitter information credibility study summarize three categories of features used to identify rumors, which are message-based, user-based, and propagation-based features....
[...]
...[7] in their comprehensive study summarized the following three main...
[...]