Proceedings of the 19th ACM International Conference on Information and Knowledge Management 2010
DOI: 10.1145/1871437.1871737
|View full text |Cite
|
Sign up to set email alerts
|

A study of rumor control strategies on social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 111 publications
(47 citation statements)
references
References 6 publications
0
47
0
Order By: Relevance
“…This section revises Tripathy et al's approach [21] for modeling the rumor spreading in Twitter. This model is based on the cascade model [22] and is one of the earliest ABSS rumor spread models proposed for the Twitter case.…”
Section: Baseline Approachmentioning
confidence: 98%
See 1 more Smart Citation
“…This section revises Tripathy et al's approach [21] for modeling the rumor spreading in Twitter. This model is based on the cascade model [22] and is one of the earliest ABSS rumor spread models proposed for the Twitter case.…”
Section: Baseline Approachmentioning
confidence: 98%
“…However, getting an accurate spread model is not the paper goal. Tripathy et al [21] present a study and an evaluation of rumor-like methods for combating the spread of rumors on social networks. They use variants of the independent cascade model [22] for rumor spreading.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, in [6] the authors defined a method to infer the topology of networks analyzing the paths used by the nodes of the OSN to spread information. On the other hand, [15] presents and evaluates strategies for controlling the diffusion of rumors within social networks. This is done by injecting in the social network anti-rumors, which are packets of information containing a statement from trusted authority indicating to block the propagation of a particular rumor.…”
Section: Related Workmentioning
confidence: 99%
“…The immunization problem is mathematically equivalent to asking how to disintegrate a given network with a minimum number of node removals, which is very important since in most cases the number of immunization doses is limited or very expensive. Other examples of network disintegration include destabilizing terrorist networks [11] , preventing financial contagion [12] , controlling the rumor diffusion [13] , and perturbing cancer networks [14] . Although the problem of network disintegration is not obtained more attention than the problem of network protection, some related works have been devoted to the study of the attack strategy.…”
Section: Introductionmentioning
confidence: 99%