skip to main content
10.1145/3627673.3679796acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

New Localization Frameworks: User-centric Approaches to Source Localization in Real-world Propagation Scenarios

Published: 21 October 2024 Publication History

Abstract

Source localization in social platforms is critical for managing and controlling the misinformation spreading. Despite all the recent advancements, existing methods do not consider the dynamic and heterogeneous propagation behaviors of users and are developed based on simulated data with strong model assumptions, limiting the application in real-world scenarios. This research addresses this limitation by presenting a novel framework for source localization, grounded in real-world propagation cascades from platforms like Weibo and Twitter. What's more, recognizing the user-driven nature of users in information spread, we systematically crawl and integrate user-specific profiles, offering a realistic understanding of user-driven propagation dynamics. In summary, by developing datasets derived from real-world propagation cascades, we set a precedent in enhancing the authenticity and practice of source identification for social media. Our comprehensive experiments not only validate the feasibility and rationale of our novel user-centric localization approaches but also emphasize the significance of considering user profiles in real-world propagation scenarios. The code is available at https://github.com/cgao-comp/NFSL.

References

[1]
Ameya Agaskar and Yue M. Lu. 2013. A fast Monte Carlo algorithm for source localization on graphs. In SPIE Optical Engineering and Applications. 88581N.
[2]
Ming Dong, Bolong Zheng, Guohui Li, Chenliang Li, Kai Zheng, and Xiaofang Zhou. 2022. Wavefront-Based Multiple Rumor Sources Identification by Multi-Task Learning. IEEE Transactions on Emerging Topics in Computational Intelligence (2022).
[3]
Ming Dong, Bolong Zheng, Nguyen Quoc Viet Hung, Han Su, and Guohui Li. 2019. Multiple Rumor Source Detection with Graph Convolutional Networks. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management. 569--578.
[4]
Glenn Ellison. 2020. Implications of heterogeneous SIR models for analyses of COVID-19. Technical Report. National Bureau of Economic Research.
[5]
Jacob Goldenberg, Barak Libai, and Eitan Muller. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters, Vol. 12, 3 (2001), 211--223.
[6]
Mark Granovetter. 1978. Threshold models of collective behavior. Amer. J. Sociology, Vol. 83, 6 (1978), 1420--1443.
[7]
Dongpeng Hou, Chao Gao, Zhen Wang, Xiaoyu Li, and Xuelong Li. 2024. Random Full-Order-Coverage Based Rapid Source Localization With Limited Observations for Large-Scale Networks. IEEE Transactions on Network Science and Engineering (2024).
[8]
Dongpeng Hou, Zhen Wang, Chao Gao, and Xuelong Li. 2023. Sequential Attention Source Identification Based on Feature Representation. (2023), 4794--4802.
[9]
Dongpeng Hou, Shu Yin, Chao Gao, Xianghua Li, and Zhen Wang. 2024. Propagation Dynamics of Rumor vs. Non-rumor across Multiple Social Media Platforms Driven by User Characteristics. arXiv preprint arXiv:2401.17840 (2024).
[10]
Roland Imhoff and Pia Lamberty. 2020. A bioweapon or a hoax? The link between distinct conspiracy beliefs about the Coronavirus disease (COVID-19) outbreak and pandemic behavior. Social Psychological and Personality Science, Vol. 11, 8 (2020), 1110--1118.
[11]
Md Saiful Islam, Tonmoy Sarkar, and Sazzad Hossain Khan. 2020. COVID-19--related infodemic and its impact on public health: A global social media analysis. The American Journal of Tropical Medicine and Hygiene, Vol. 103, 4 (2020), 1621.
[12]
Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, and Wanlei Zhou. 2016. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Communications Surveys & Tutorials, Vol. 19, 1 (2016), 465--481.
[13]
Brian Karrer and Mark EJ Newman. 2010. Message passing approach for general epidemic models. Physical Review E, Vol. 82, 1 (2010), 016101.
[14]
Chen Ling, Junji Jiang, Junxiang Wang, and Zhao Liang. 2022. Source Localization of Graph Diffusion via Variational Autoencoders for Graph Inverse Problems. In Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1010--1020.
[15]
Xiaomo Liu, Armineh Nourbakhsh, Quanzhi Li, Rui Fang, and Sameena Shah. 2015. Real-time Rumor Debunking on Twitter. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. 1867--1870.
[16]
Linyuan Lü, Tao Zhou, Qian-Ming Zhang, and H Eugene Stanley. 2016. The H-index of a network node and its relation to degree and coreness. Nature communications, Vol. 7, 1 (2016), 10168.
[17]
Jing Ma, Wei Gao, Prasenjit Mitra, Sejeong Kwon, Bernard J. Jansen, Kam-Fai Wong, and Cha Meeyoung. 2016. Detecting Rumors from Microblogs with Recurrent Neural Networks. In The 25th International Joint Conference on Artificial Intelligence. AAAI, 3818--3824.
[18]
Jing Ma, Wei Gao, and Kam-Fai Wong. 2017. Detect Rumors in Microblog Posts Using Propagation Structure via Kernel Learning. In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Vol. 1. 708--717.
[19]
Robert Paluch, Łukasz Gajewski, Krzysztof Suchecki, and Bolesław Szyma'nski. 2021. Enhancing maximum likelihood estimation of infection source localization. In Simplicity of Complexity in Economic and Social Systems. 21--41.
[20]
Robert Paluch, Xiaoyan Lu, Krzysztof Suchecki, Bolesław K Szyma'nski, and Janusz A Hołyst. 2018. Fast and accurate detection of spread source in large complex networks. Scientific Reports, Vol. 8, 1 (2018), 1--10.
[21]
SGOPAL Patro and Kishore Kumar Sahu. 2015. Normalization: A preprocessing stage. arXiv preprint arXiv:1503.06462 (2015).
[22]
Pedro C Pinto, Patrick Thiran, and Martin Vetterli. 2012. Locating the source of diffusion in large-scale networks. Physical Review Letters, Vol. 109, 6 (2012), 068702.
[23]
Maryam Ramezani, Aryan Ahadinia, Amirmohammad Ziaei Bideh, and Hamid R Rabiee. 2023. Joint Inference of Diffusion and Structure in Partially Observed Social Networks Using Coupled Matrix Factorization. ACM Transactions on Knowledge Discovery from Data, Vol. 17, 9 (2023), 1--28.
[24]
Benedek Rozemberczki, Carl Allen, and Rik Sarkar. 2021. Multi-scale attributed node embedding. Journal of Complex Networks, Vol. 9, 2 (2021), 1--22.
[25]
Xincheng Shu, Bin Yu, Zhongyuan Ruan, Qingpeng Zhang, and Qi Xuan. 2021. Information Source Estimation with Multi-Channel Graph Neural Network. Graph Data Mining: Algorithm, Security and Application (2021), 1--27.
[26]
Wenchang Tang, Feng Ji, and Wee Peng Tay. 2018. Estimating infection sources in networks using partial timestamps. IEEE Transactions on Information Forensics and Security, Vol. 13, 12 (2018), 3035--3049.
[27]
Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Lio, and Yoshua Bengio. 2018. Graph attention networks. International Conference on Learning Representations (2018).
[28]
Hongjue Wang and Kaijia Sun. 2020. Locating source of heterogeneous propagation model by universal algorithm. Europhysics Letters, Vol. 131, 4 (2020), 48001.
[29]
Junxiang Wang, Junji Jiang, and Liang Zhao. 2022. An Invertible Graph Diffusion Neural Network for Source Localization. In Proceedings of the ACM Web Conference. 1058--1069.
[30]
Zhen Wang, Dongpeng Hou, Chao Gao, Jiajin Huang, and Qi Xuan. 2022. A Rapid Source Localization Method in the Early Stage of Large-scale Network Propagation. In Proceedings of the ACM Web Conference. 1372--1380.
[31]
Zhen Wang, Dongpeng Hou, Chao Gao, Xiaoyu Li, and Xuelong Li. 2023. Lightweight source localization for large-scale social networks. In Proceedings of the ACM Web Conference 2023. 286--294.
[32]
Zheng Wang, Chaokun Wang, Jisheng Pei, and Xiaojun Ye. 2017. Multiple source detection without knowing the underlying propagation model. In Proceedings of the AAAI Conference on Artificial Intelligence. 217--223.
[33]
Zheng Wang, Chaokun Wang, Jisheng Pei, and Xiaojun Ye. 2017. Multiple source detection without knowing the underlying propagation model. In Proceedings of the AAAI Conference on Artificial Intelligence. PALO ALTO, CA 94303 USA, San Francisco, CA, 217--223.
[34]
Max Welling and Thomas N Kipf. 2016. Semi-supervised classification with graph convolutional networks. In International Conference on Learning Representations (ICLR 2017).
[35]
Fan Yang, Shuhong Yang, Yong Peng, Yabing Yao, Zhiwen Wang, Houjun Li, Jingxian Liu, Ruisheng Zhang, and Chungui Li. 2020. Locating the propagation source in complex networks with a direction-induced search based Gaussian estimator. Knowledge-Based Systems, Vol. 195 (2020), 105674.
[36]
Shu Yin, Peican Zhu, Lianwei Wu, Chao Gao, and Zhen Wang. 2024. GAMC: An Unsupervised Method for Fake News Detection Using Graph Autoencoder with Masking. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 38. 347--355.
[37]
Wenyu Zang, Chuan Zhou, Li Guo, and Peng Zhang. 2015. Topic-aware source locating in social networks. In Proceedings of the 24th International Conference on World Wide Web. 141--142.
[38]
Kai Zhu and Lei Ying. 2014. Information source detection in the SIR model: A sample-path-based approach. IEEE/ACM Transactions on Networking, Vol. 24, 1 (2014), 408--421.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge Management
October 2024
5705 pages
ISBN:9798400704369
DOI:10.1145/3627673
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 October 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. real-world cascades
  2. source localization
  3. user profiles

Qualifiers

  • Research-article

Funding Sources

  • the National Natural Science Foundation of China
  • Fok Ying-Tong Education Foundation, China
  • the Tencent Foundation and XPLORER PRIZE
  • the Fundamental Research Funds for the Central Universities

Conference

CIKM '24
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 99
    Total Downloads
  • Downloads (Last 12 months)99
  • Downloads (Last 6 weeks)16
Reflects downloads up to 30 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media