Detailed Information

Cited 0 time in webofscience Cited 8 time in scopus
Metadata Downloads

AIM: Activation increment minimization strategy for preventing bad information diffusion in OSNs

Full metadata record
DC Field Value Language
dc.contributor.authorTan, Zhenhua-
dc.contributor.authorWu, DanKe-
dc.contributor.authorGao, Tianhan-
dc.contributor.authorYou, Ilsun-
dc.contributor.authorSharma, Vishal-
dc.date.accessioned2021-08-11T09:44:10Z-
dc.date.available2021-08-11T09:44:10Z-
dc.date.issued2019-05-
dc.identifier.issn0167-739X-
dc.identifier.issn1872-7115-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/4576-
dc.description.abstractThe openness and virtuality of Online Social Networks (OSNs) make it a hotbed of rapid propagation for various kinds of frauds and erroneous information. Ergo, there is an exigent need to find a method that can expeditiously and efficaciously limit the diffusion of misinformation in OSNs. To resolve this issue, this article proposes the utilization of Activation Increment engendered by a node as a criterion to quantify the importance of the node. Even if the propagation probabilities between the nodes are identically tantamount, due to the dynamics of information propagation and high connectivity of the network, the activation probabilities of nodes are different. The Activation Increment describes the sum of activation probabilities of a node's neighbors while the node itself is in a different state (infected status, recovered status) at a certain time. To utilize Activation Increment, this paper proposes Activation Increment Minimization (AIM) strategy to select and block nodes for information diffusion. Experiments based on the real social network dataset attested that the proposed AIM strategy is superior to the traditional heuristic algorithms. (C) 2018 Published by Elsevier B.V.-
dc.format.extent9-
dc.language영어-
dc.language.isoENG-
dc.publisherElsevier BV-
dc.titleAIM: Activation increment minimization strategy for preventing bad information diffusion in OSNs-
dc.typeArticle-
dc.publisher.location네델란드-
dc.identifier.doi10.1016/j.future.2018.11.038-
dc.identifier.scopusid2-s2.0-85057740512-
dc.identifier.wosid000460845200026-
dc.identifier.bibliographicCitationFuture Generation Computer Systems, v.94, pp 293 - 301-
dc.citation.titleFuture Generation Computer Systems-
dc.citation.volume94-
dc.citation.startPage293-
dc.citation.endPage301-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusONLINE SOCIAL NETWORKS-
dc.subject.keywordPlusMODEL-
dc.subject.keywordPlusBLOCKING-
dc.subject.keywordAuthorDiffusion limited-
dc.subject.keywordAuthorNode selection strategies-
dc.subject.keywordAuthorInformation diffusion-
dc.subject.keywordAuthorOnline social network author biographies-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE