2018
DOI: 10.1109/tcss.2018.2818661
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Rumor Blocking With Multiple Positive Cascades

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(20 citation statements)
references
References 31 publications
0
18
0
Order By: Relevance
“…These works focus heavily on building and testing algorithms that can be automatically applied to large-scale data so as to identify and deal with critical nodes both quickly and at low costs. As one example, a group of researchers looked at information cascades as a method for limiting the spread of mis/ disinformation (45). Their approach focuses on stifling the spread of false information by identifying it early, seeding key nodes in a social network with accurate information, and allowing those users to spread the accurate information to others before they are exposed to the false content.…”
Section: Computational Text Analysis Natural Language Processing and Topicmentioning
confidence: 99%
“…These works focus heavily on building and testing algorithms that can be automatically applied to large-scale data so as to identify and deal with critical nodes both quickly and at low costs. As one example, a group of researchers looked at information cascades as a method for limiting the spread of mis/ disinformation (45). Their approach focuses on stifling the spread of false information by identifying it early, seeding key nodes in a social network with accurate information, and allowing those users to spread the accurate information to others before they are exposed to the false content.…”
Section: Computational Text Analysis Natural Language Processing and Topicmentioning
confidence: 99%
“…Last but not least is the 'blocking' (2%) mitigation effort, which holds the least number of articles to produce. Only 2 contributions are found in blocking effort, and both of these articles introduced a model that can help in blocking of the propaganda messages [80], [81]. Table 6 below applies the classification schema on the primary studies that provide an overview of the field of cyber-propaganda research.…”
Section: Discussionmentioning
confidence: 99%
“…Hence, the main research direction around this topic is to develop a fast, effective algorithm for seeking a proper subset of influence people. See [16][17][18][19], for some typical literature.…”
Section: Truth-publishing Approachesmentioning
confidence: 99%