Skip to main content

Rumor Detection via Recurrent Neural Networks: A Case Study on Adaptivity with Varied Data Compositions

  • Conference paper
  • First Online:
Trends and Applications in Knowledge Discovery and Data Mining (PAKDD 2018)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11154))

Included in the following conference series:

Abstract

Rumor detection is a meaningful research problem due to its significance in preventing potential threats to cyber security and social stability. With the recent popularity of recurrent neural networks (RNNs), the application of RNNs in rumor detection has resulted in promising results as RNNs can naturally blend into the task of language processing and sequential data modelling. However, since deep learning models require large data scale for training in order to extract sufficient distinctive patterns, their adaptivity with varied data compositions can become a challenge for real-life application scenarios where rumors are always the minority (outlier) in the streaming data. In this paper, we present a case study to investigate how the ratio of rumors in training data affects the calssification performance of RNN based rumor detection models and successfully address some issues on the model adaptivity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.dailymail.co.uk/news/article-2313652/AP-Twitter-hackers-break-news-White-House-explosions-injured-Obama.html.

  2. 2.

    www.snopes.com.

References

  1. Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: WWW, pp. 675–684. ACM (2011)

    Google Scholar 

  2. Chen, C., Wang, Y., Zhang, J., Xiang, Y., Zhou, W., Min, G.: Statistical features-based real-time detection of drifted twitter spam. IEEE Trans. Inf. Forensics Secur. 12(4), 914–925 (2017)

    Article  Google Scholar 

  3. Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)

  4. Chen, W., et al.: EEG-based motion intention recognition via multi-task RNNs. In: Proceedings of the 2018 SIAM International Conference on Data Mining, SIAM (2018)

    Google Scholar 

  5. Ma, J., et al.: Detecting rumors from microblogs with recurrent neural networks. In: IJCAI (2016)

    Google Scholar 

  6. Grier, C., Thomas, K., Paxson, V., Zhang, M.: @spam: the underground on 140 characters or less. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 27–37. ACM (2010)

    Google Scholar 

  7. Hu, X., Tang, J., Gao, H., Liu, H.: Social spammer detection with sentiment information. In: ICDM, pp. 180–189. IEEE (2014)

    Google Scholar 

  8. Zhao, Z., Resnick, P., Mei, Q.: Enquiring minds: early detection of rumors in social media from enquiry posts. In: WWW, pp. 1395–1405. ACM (2015)

    Google Scholar 

  9. Sampson, J., Morstatter, F., Wu, L., Liu, H.: Leveraging the implicit structure within social media for emergent rumor detection. In: CIKM, pp. 2377–2382. ACM (2016)

    Google Scholar 

  10. Wu, L., Li, J., Hu, X., Liu, H.: Gleaning wisdom from the past: early detection of emerging rumors in social media. In: SDM (2016)

    Google Scholar 

  11. Ma, J., Gao, W., Wei, Z., Lu, Y., Wong, K.F.: Detect rumors using time series of social context information on microblogging websites. In: CIKM, pp. 1751–1754. ACM (2015)

    Google Scholar 

  12. Chen, T., Wu, L., Li, X., Zhang, J., Yin, H., Wang, Y.: Call attention to rumors: deep attention based recurrent neural networks for early rumor detection. arXiv preprint arXiv:1704.05973 (2017)

  13. Chen, H., Yin, H., Li, X., Wang, M., Chen, W., Chen, T.: People opinion topic model: opinion based user clustering in social networks. In: WWW Companion, International World Wide Web Conferences Steering Committee, pp. 1353–1359 (2017)

    Google Scholar 

  14. Kwon, S., Cha, M., Jung, K., Chen, W., Wang, Y.: Prominent features of rumor propagation in online social media. In: ICDM, pp. 1103–1108. IEEE (2013)

    Google Scholar 

  15. Greff, K., Srivastava, R.K., Koutník, J., Steunebrink, B.R., Schmidhuber, J.: LSTM: a search space odyssey. IEEE Trans. Neural Netw. Learn. Syst. 28, 2222–2232 (2016)

    Article  MathSciNet  Google Scholar 

  16. Rosenberg, A.: Classifying skewed data: importance weighting to optimize average recall. In: Thirteenth Annual Conference of the International Speech Communication Association (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, T., Chen, H., Li, X. (2018). Rumor Detection via Recurrent Neural Networks: A Case Study on Adaptivity with Varied Data Compositions. In: Ganji, M., Rashidi, L., Fung, B., Wang, C. (eds) Trends and Applications in Knowledge Discovery and Data Mining. PAKDD 2018. Lecture Notes in Computer Science(), vol 11154. Springer, Cham. https://doi.org/10.1007/978-3-030-04503-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-04503-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-04502-9

  • Online ISBN: 978-3-030-04503-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics