A Graph-Theoretic Embedding-Based Approach for Rumor Detection in Twitter

被引:0
|
作者
Abulaish, Muhammad [1 ]
Kumari, Nikita [1 ]
Fazil, Mohd. [1 ]
Singh, Basanta Kumar [1 ]
机构
[1] South Asian Univ, Dept Comp Sci, New Delhi, India
关键词
Rumor detection; Social network analysis; Word embedding;
D O I
10.1145/3350546.3352569
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a graph-theoretic embedding-based approach to model user-generated contents in online social media for rumor detection. Starting with a small set of seed rumor words of four different lexical categories, we generate a words co-occurrence graph and apply centrality-based analysis to identify prominent rumor characterizing words. Thereafter, word embedding is applied to represent each category of seed words as numeric vectors and to train three different classification models for rumor detection. The performance of the proposed approach is empirically evaluated over two versions of a benchmark dataset. The proposed approach is also compared with one of the state-of-the-art methods for rumor detection and performs significantly better.
引用
收藏
页码:466 / 470
页数:5
相关论文
共 50 条
  • [1] A graph-theoretic approach for inparalog detection
    Olivier Tremblay-Savard
    Krister M Swenson
    [J]. BMC Bioinformatics, 13
  • [2] A graph-theoretic approach for inparalog detection
    Tremblay-Savard, Olivier
    Swenson, Krister M.
    [J]. BMC BIOINFORMATICS, 2012, 13
  • [3] Corruption and its detection: a graph-theoretic approach
    Thebeth Rufaro Mukwembi
    Simon Mukwembi
    [J]. Computational and Mathematical Organization Theory, 2017, 23 : 293 - 300
  • [4] Corruption and its detection: a graph-theoretic approach
    Mukwembi, Thebeth Rufaro
    Mukwembi, Simon
    [J]. COMPUTATIONAL AND MATHEMATICAL ORGANIZATION THEORY, 2017, 23 (02) : 293 - 300
  • [5] A graph-theoretic approach for the detection of phishing webpages
    Tan, Choon Lin
    Chiew, Kang Leng
    Yong, Kelvin S. C.
    Sze, San Nah
    Abdullah, Johari
    Sebastian, Yakub
    [J]. COMPUTERS & SECURITY, 2020, 95
  • [6] Modeling Topic Evolution in Twitter: An Embedding-Based Approach
    Abulaish, Muhammad
    Fazil, Mohd
    [J]. IEEE ACCESS, 2018, 6 : 64847 - 64857
  • [7] A graph-theoretic approach to steganography
    Hetzl, S
    Mutzel, P
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 119 - 128
  • [8] A graph-theoretic approach to multitasking
    Alon, Noga
    Reichman, Daniel
    Shinkar, Igor
    Wagner, Tal
    Musslick, Sebastian
    Cohen, Jonathan D.
    Griffiths, Thomas L.
    Dey, Biswadip
    Ozcimder, Kayhan
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [9] Graph Embedding-Based Money Laundering Detection for Ethereum
    Liu, Jiayi
    Yin, Changchun
    Wang, Hao
    Wu, Xiaofei
    Lan, Dongwan
    Zhou, Lu
    Ge, Chunpeng
    [J]. ELECTRONICS, 2023, 12 (14)
  • [10] Unified Graph Embedding-Based Anomalous Edge Detection
    Ouyang, Linshu
    Zhang, Yongzheng
    Wang, Yipeng
    [J]. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,