2020
DOI: 10.1109/access.2020.2989140
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Topic Misinformation Blocking With Budget Constraint on Online Social Networks

Abstract: Along with the development of Information Technology, Online Social Networks (OSN) are constantly developing and have become popular media in the world. Besides communication enhancement benefits, OSN have such limitations on rapid spread of false information as rumors, fake news, and contradictory news. False information spread is collectively referred to as misinformation which has significant on social communities. The more sources and topics of misinformation are, the greater the number of users are affect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 121 publications
(34 citation statements)
references
References 36 publications
0
33
0
1
Order By: Relevance
“…Third-party data are gathered, aggregated, and businesses sold to help them develop successful advertising and return campaigns [9,10]. Its ordinary audience helps businesses expand in size to include potential prospects for which person buys related services from a direct competitor [11]. Sellers from third parties have legal access to vital infrastructure and confidential details of customers [12].…”
Section: Overview Of Managing Data Security Using Keyed-hash Message Authentication Code-based Encryption Algorithmmentioning
confidence: 99%
“…Third-party data are gathered, aggregated, and businesses sold to help them develop successful advertising and return campaigns [9,10]. Its ordinary audience helps businesses expand in size to include potential prospects for which person buys related services from a direct competitor [11]. Sellers from third parties have legal access to vital infrastructure and confidential details of customers [12].…”
Section: Overview Of Managing Data Security Using Keyed-hash Message Authentication Code-based Encryption Algorithmmentioning
confidence: 99%
“…And the health status is continuously monitored and sent to the patient's physician or caretaker. If the measured data is observed with threshold or when there is medical risk, then it will track the GPS location of the patient and the measured data will be uploaded to cloud and the data will be sent to their concerned physician or caretaker through an alert message via smartphone [25][26][27][28][29].…”
Section: I2c Modulementioning
confidence: 99%
“…Therefore, the containers need to use hash for establishing the feature execution. TPM needs to launch trust among the host as it offers its instances for deploying the protocols for allocating the endorsement keys [29][30][31][32].…”
Section: Figure 4 Docker Enginementioning
confidence: 99%