您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(工学版)》

山东大学学报 (工学版) ›› 2022, Vol. 52 ›› Issue (4): 89-98.doi: 10.6040/j.issn.1672-3961.0.2021.296

• • 上一篇    下一篇

基于混合深度模型的虚假信息早期检测

黄皓1,周丽华1*,黄亚群1,姜懿庭2   

  1. 1.云南大学信息学院, 云南 昆明 650000;2.云南师范大学信息学院, 云南 昆明 650000
  • 发布日期:2022-08-24
  • 作者简介:黄皓(1994— ),男,四川成都人,硕士研究生,主要研究方向为数据挖掘、信息扩散. E-mail:840670997@qq.com. *通信作者简介:周丽华(1968— ),女,云南昆明人,教授,博士,CCF会员,主要研究方向为数据挖掘、社会网络分析、人工智能. E-mail: lhzhou@ynu.edu.cn
  • 基金资助:
    国家自然科学基金项目(61762090,62062066,61966036和61662086);云南省大学创新计划(IRTSTYN);国家社会科学基金项目(18XZZ005)

Early detection of fake news based on hybrid deep model

HUANG Hao1, ZHOU Lihua1*, HUANG Yaqun1, JIANG Yiting2   

  1. 1. School of Information, Yunnan University, Kunming 650000, Yunnan, China;
    2. School of Information, Yunnan Normal University, Kunming 650000, Yunnan, China
  • Published:2022-08-24

摘要: 针对一种信息特征进行检测方法在信息传播早期阶段提取的特征信息往往不充分,导致传播早期阶段检测准确率较低的问题,提出一个新颖的混合深度模型EGSI,模型由EXTRACT、GRU、SCORE和INTERATE 4个模块组成。EXTRACT通过卷积神经网络提取信息的传播路径特征,GRU通过门控循环单元捕获信息的文本特征和反馈特征,SCORE基于用户行为挖掘用户特征,INRERATE整合以上特征并预测出信息事件类标。EGSI通过整合信息最基本的4种特征(文本、用户、反馈、传播路径),从而可以在信息传播的早期阶段充分提取可用特征信息,进而较准确地检测出虚假信息。真实数据集的试验结果表明,模型在信息传播60 min内的准确率达到95.9%。相比基准方法,EGSI模型在检测虚假信息的准确率和时效性之间取得了较好的平衡。

关键词: 虚假信息早期检测, 混合深度模型, 神经网络, 时序分析, 信息特征

中图分类号: 

  • TP181
[1] CASTILLO C, MENDOZA M,POBLETE B. Information credibility on twitter[C] //Proceedings of the 20th International Conference on World Wide Web. Hyderabad, India: ACM, 2011: 675-684.
[2] QAZVINIAN V, ROSENGREN E, RADEV D R, et al. Rumor has it: identifying misinformation in microblogs[C] //Proceedings of the Conference on Empirical Methods in Natural Language Processing. Edinburgh, UK: EMNLP, 2011: 1589-1599.
[3] GUPTA A, KUMARAGURU P, CASTILLO C, et al. TweetCred: real-time credibility assessment of content on twitter[C] //Proceedings of the International Conference on Social Informatics. Barcelona, Spain: SocInfo, 2014: 228-243.
[4] POPAT K. Assessing the credibility of claims on the Web[C] //Proceedings of the 26th International Conference on World Wide Web. Perth, Australia: International World Wide Web Conferences Steering Committee, 2017: 735-739.
[5] YANG F, YU X, LIU Y, et al. Automatic detection of rumor on Sina Weibo[C] //Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics. Sydney, Australia: ACM, 2015: 1-7.
[6] ZHAO Z, RESNICK P, MEI Q. Enquiring minds: early detection of rumors in social media from enquiry posts[C] //Proceedings of the 24th International Conference on World Wide Web. Geneva,Switzerland:International World Wide Web Conferences Steering Committee, 2015: 1395-1405.
[7] MA J, GAO W, MITRA P, et al. Detecting rumors from microblogs with recurrent neural networks[C] //Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence. New York, USA: AAAI Press, 2016: 3818-3824.
[8] MA J, GAO W, WONG K F. Detect rumors in microblog posts using propagation structure via kernel learning[C] //Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics. Vancouver, Canada: IJCAI, 2017: 708-717.
[9] JIN F, DOUGHERTY E R, SARAF P, et al. Epidemiological modeling of news and rumors on Twitter[C] //Proceedings of the 7th Workshop on Social Network Mining and Analysis. Chicago, USA: ACM, 2013: 1-9.
[10] WU K, YANG S, ZHU K Q. False rumors detection on Sina Weibo by propagation structures[C] //Proceedings of the 31st IEEE International Conference on Data Engineering. Seoul, Korea: ICDEW, 2015: 651-662.
[11] CHEN T, LI X, YIN H, et al. Call attention to rumors: deep attention based recurrent neural networks for early rumor detection[C] // Proceedings of Trends and Applications in Knowledge Discovery and Data Mining. Melbourne, Australia: LNCS, 2018: 40-52.
[12] LI Q, HU Q, LU Y, et al. Multi-level word features based on CNN for fake news detection in cultural communication[J]. Personal and Ubiquitous Computing, 2020, 24(2): 259-272.
[13] CHOWDHURY R, SRINIVASAN S, GETOOR L. Joint estimation of user and publisher credibility for fake news detection[C] //Proceedings of the 29th ACM Intern-ational Conference on Information & Knowledge Management. New York, America: CIKM, 2020: 1993-1996.
[14] BALESTRUCCI A, NICOLA R D. Credulous users and fake news: a real case study on the propagation in Twitter[C] //Proceedings of 2020 IEEE Conference on Evolving and Adaptive Intelligent Systems(EAIS). Bari, Italy: IEEE, 2020: 1-8.
[15] HAMDI T, SLIMI H, BOUNHAS I, et al. A hybrid approach for fake news detection in Twitter based on user features and graphembedding[C] //Proceedings of Distributed Computing and Internet Technology. Bhubaneswar, India: ICDCIT, 2020: 266-280
[16] JIANG S, CHEN X, ZHANG L, et al. User-characteristic enhanced model for fake news detection in social media[C] //Proceedings of Natural Language Processing and Chinese Computing. Dunhuang, China: NLPCC, 2019: 634-646.
[17] SAMPSON J, MORSTATTER F, WU L, et al. Leveraging the implicit structure within social media for emergent rumor detection[C] //Proceedings of the 25th ACM International on Conference on Information and Knowledge Management. Turin, Italy: CIKM, 2016: 2377-2382.
[18] LIU Y, WU Y F. Early detection of fake news on social media through propagation path classification with recurrent and convolutional networks[C] //Proceedings of the AAAI Conference on Artificial Intelligence. Louisiana, USA: AAAI, 2018: 354-361.
[19] QIAN F, GONG C, SHARMA K, et al. Neuraluser response generator: fake news detection with collective user intelligence[C] //Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence. Washington, USA: IJCAI, 2018: 3834-3840.
[20] CASTILLO C, EL-HADDAD M, PFEFFER J, et al. Characterizing the life cycle of online news stories using social media reactions[C] //Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing. Baltimore, Maryland: CSCW, 2014: 211-223.
[21] FRIGGERI A, ADAMIC L A, ECKLES D, et al. Rumor cascades[C] //Proceedings of International AAAI Conference on Web and Social Media. Ann Arbor, USA: ICWSM, 2014: 1-13.
[22] KUMAR S, WEST R, LESKOVEC J. Disinformation on the web: impact, characteristics, and detection of wikipediahoaxes[C] //Proceedings of the 25th International Conference on World Wide Web. Quebec, Canada: International World Wide Web Conferences Steering Committee, 2016: 591-602.
[23] STARBIRD K, MADDOCK J, ORAND M, et al. Rumors, false flags, and digital vigilantes: misinformation on Twitter after the 2013 Boston Marathon Bombing[C] //Proceedings of the IConference 2014. Illinois, America: ISchool, 2014: 654-662.
[24] KWON S, CHA M, JUNG K. Rumor detection over varying time windows[J]. PLOS ONE, 2017,12(1):1-19.
[25] RUCHANSKY N, SEO S, LIU Y. CSI: ahybrid deep model for fake news detection[C] //Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. Singapore: CIKM, 2017: 797-806.
[1] 黄芳,王欣,高国海,沈玲珍,付勋,方宇. 融合主客观评价的图数据Top-k频繁模式挖掘[J]. 山东大学学报 (工学版), 2025, 55(6): 1-12.
[2] 邵孟伟,袁世飞,周宏志,王乃华. 基于BP神经网络和遗传算法的翅片管结构优化[J]. 山东大学学报 (工学版), 2025, 55(6): 76-82.
[3] 邓彬, 张宗包, 赵文猛, 罗新航, 吴秋伟. 基于云边协同和图神经网络的电动汽车充电站负荷预测方法[J]. 山东大学学报 (工学版), 2025, 55(5): 62-69.
[4] 董明书,陈俐企,马川义,张珠皓,孙仁娟,管延华,庄培芝. 沥青路面内部裂缝雷达图像智能判识算法研究[J]. 山东大学学报 (工学版), 2025, 55(3): 72-79.
[5] 贾轩,许吉凯,任艺婧,刘德才,许强,张利. 基于样本扩容和数据驱动的台区理论线损计算方法[J]. 山东大学学报 (工学版), 2025, 55(3): 158-164.
[6] 祝明,石承龙,吕潘,刘现荣,孙驰,陈建城,范宏运. 基于优化长短时记忆网络的深基坑变形预测方法及其工程应用[J]. 山东大学学报 (工学版), 2025, 55(3): 141-148.
[7] 李伟豪,王苹苹,许万博,魏本征. 结构先验引导的多模态腰椎MRI图像分割算法[J]. 山东大学学报 (工学版), 2025, 55(1): 66-76.
[8] 孙尚渠,张恭禄,蒋志斌,李朝阳. 盾构滚刀磨损的影响因素敏感性分析及预测[J]. 山东大学学报 (工学版), 2025, 55(1): 86-96.
[9] 林振宇,邵蓥侠. 基于盖根堡多项式最佳平方近似的谱图网络[J]. 山东大学学报 (工学版), 2024, 54(5): 93-100.
[10] 常新功,苏敏惠,周志刚. 基于进化集成的图神经网络解释方法[J]. 山东大学学报 (工学版), 2024, 54(4): 1-12.
[11] 马翔悦,徐金东,倪梦莹. 基于多尺度特征模糊卷积神经网络的遥感图像分割[J]. 山东大学学报 (工学版), 2024, 54(3): 44-54.
[12] 赵涛,张宁,王小超,马川义,田源,张圣涛,杨梓梁. 基于图神经网络轨迹预测的合流区交通冲突预测方法[J]. 山东大学学报 (工学版), 2024, 54(2): 36-46.
[13] 李璐,张志军,范钰敏,王星,袁卫华. 面向冷启动用户的元学习与图转移学习序列推荐[J]. 山东大学学报 (工学版), 2024, 54(2): 69-79.
[14] 范黎林,刘士豪,李源,毛文涛,陈宗涛. 基于课程正则化的物理信息神经网络渐进式训练策略[J]. 山东大学学报 (工学版), 2024, 54(1): 11-24.
[15] 孙园,曾惠权,欧阳苏建,高佳倩,王绮楠,林智勇. 基于粒子群算法的模糊大脑情感学习非线性系统辨识[J]. 山东大学学报 (工学版), 2024, 54(1): 25-32.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 张永花,王安玲,刘福平 . 低频非均匀电磁波在导电界面的反射相角[J]. 山东大学学报(工学版), 2006, 36(2): 22 -25 .
[2] 孔祥臻,刘延俊,王勇,赵秀华 . 气动比例阀的死区补偿与仿真[J]. 山东大学学报(工学版), 2006, 36(1): 99 -102 .
[3] 来翔 . 用胞映射方法讨论一类MKdV方程[J]. 山东大学学报(工学版), 2006, 36(1): 87 -92 .
[4] 余嘉元1 , 田金亭1 , 朱强忠2 . 计算智能在心理学中的应用[J]. 山东大学学报(工学版), 2009, 39(1): 1 -5 .
[5] 季涛,高旭,孙同景,薛永端,徐丙垠 . 铁路10 kV自闭/贯通线路故障行波特征分析[J]. 山东大学学报(工学版), 2006, 36(2): 111 -116 .
[6] 秦通,孙丰荣*,王丽梅,王庆浩,李新彩. 基于极大圆盘引导的形状插值实现三维表面重建[J]. 山东大学学报(工学版), 2010, 40(3): 1 -5 .
[7] 刘文亮,朱维红,陈涤,张泓泉. 基于雷达图像的运动目标形态检测及跟踪技术[J]. 山东大学学报(工学版), 2010, 40(3): 31 -36 .
[8] 王丽君,黄奇成,王兆旭 . 敏感性问题中的均方误差与模型比较[J]. 山东大学学报(工学版), 2006, 36(6): 51 -56 .
[9] 孙殿柱,朱昌志,李延瑞 . 散乱点云边界特征快速提取算法[J]. 山东大学学报(工学版), 2009, 39(1): 84 -86 .
[10] 薛翊国,李术才,赵岩,苏茂鑫,李为腾,丁志海. 青岛胶州湾海底隧道F44含水断层注浆前后TSP探测分析[J]. 山东大学学报(工学版), 2009, 39(2): 108 -112 .