CN116468569A - Group-based model construction method for false information propagation - Google Patents
Group-based model construction method for false information propagation Download PDFInfo
- Publication number
- CN116468569A CN116468569A CN202310260022.0A CN202310260022A CN116468569A CN 116468569 A CN116468569 A CN 116468569A CN 202310260022 A CN202310260022 A CN 202310260022A CN 116468569 A CN116468569 A CN 116468569A
- Authority
- CN
- China
- Prior art keywords
- node
- information
- nodes
- probability
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000010276 construction Methods 0.000 title claims abstract description 5
- 238000000034 method Methods 0.000 claims abstract description 55
- 230000007704 transition Effects 0.000 claims abstract description 8
- 238000001914 filtration Methods 0.000 claims abstract description 5
- 230000001902 propagating effect Effects 0.000 claims abstract description 4
- 230000030279 gene silencing Effects 0.000 claims description 24
- 230000005540 biological transmission Effects 0.000 claims description 19
- 230000008569 process Effects 0.000 claims description 5
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 230000036039 immunity Effects 0.000 claims description 3
- 238000002649 immunization Methods 0.000 claims description 3
- 230000003053 immunization Effects 0.000 claims description 3
- 230000006399 behavior Effects 0.000 abstract 2
- 230000000694 effects Effects 0.000 description 3
- 208000015181 infectious disease Diseases 0.000 description 3
- 230000002401 inhibitory effect Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000002265 prevention Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000005764 inhibitory process Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 238000000855 fermentation Methods 0.000 description 1
- 230000004151 fermentation Effects 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 230000002458 infectious effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000000192 social effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computing arrangements based on specific mathematical models
- G06N7/01—Probabilistic graphical models, e.g. probabilistic networks
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Marketing (AREA)
- Artificial Intelligence (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Probability & Statistics with Applications (AREA)
- Algebra (AREA)
- Human Resources & Organizations (AREA)
- Computational Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A model construction method for false information propagation based on groups comprises constructing a network; secondly, randomly selecting a certain proportion of intelligent nodes in the network; thirdly, distributing different information filtering capacities for the common node and the selected intelligent node; fourth, setting transition probabilities between node states; fifthly, propagating based on a cascade information propagation method; finally, an information propagation range index is calculated. The invention simulates the behaviors of intelligent groups in the group in the propagation model, sets intelligent nodes in the model for observing the influence of node behaviors on false information propagation, and explores the role of the language in the group information propagation.
Description
Technical Field
The invention relates to the field of network false information propagation, in particular to a social network false information propagation model based on groups.
Background
With the advent of web2.0, information can be rapidly and widely disseminated due to the popularity of various social media platforms (e.g., online social networks, microblogs, and WeChat). Millions of people discuss and share their topics on these social media, ranging from public transactions to personal life, which greatly facilitates people's communication and dissemination of information. The information propagation process is known, the propagation characteristics of social media are revealed, and important theory and application values are achieved. It is therefore also one of the most popular topics. The transmission of information can lead to large-scale infection, and the real information is beneficial to people and can be widely transmitted; and the propagation of some false information may lead to serious social effects, the propagation of which should be impaired. Due to the high degree of freedom in social networks, it is more difficult to control the propagation of information. Therefore, research on the characteristics and prevention and control aspects of false information propagation is very important.
Chinese patent publication No. CN111797328 (a method for inhibiting rumor transmission in social networks) discloses a method for inhibiting rumor transmission in social networks. According to the method, the network is subjected to (k, eta) kernel decomposition, the number of immune persons selected from each (k, eta) kernel is calculated based on the number of infectious persons of the (k, eta) kernel and the kernel value, then the influence of rumors of infection sets when uninfected individuals are taken as immune persons is calculated according to a rumor transmission model, and the individual with the smallest influence of rumor transmission is selected to be added into the immune person set, so that a final immune person set is obtained. Individuals in the immune repertoire are immunized to suppress rumor transmission. The method can quickly and effectively find immune individuals in the social network for the large-scale social network to achieve the purpose of inhibiting rumor transmission. Publication number CN119669958 (a rumor propagation model building method) provides a rumor propagation model that considers both individual liveness and the mechanism of rumors. By improving the SIR model, a multi-factor model SIWISR-M model is proposed. The rumor-avoiding mechanism provided by the invention can effectively reduce the peak value of the density of rumors and the duration of rumors. Chinese patent publication number CN111274496 (a method for constructing a rumor propagation model taking groups into account on heterogeneous networks) discloses an SEIR rumor propagation model based on the group characteristics of today's mobile social networks, which randomly sets some groups in the network, and the propagation mechanism includes group propagation and node propagation, and explores the role of groups in propagation in heterogeneous networks.
However, in the above-mentioned existing rumor propagation model or rumor suppression method, the effect of the existence of the intelligent node on information propagation is not studied, and the influence of the comment made in the group on the information propagation process is not considered, so the model is not perfect.
The presence of groups in a social network can enable information to be rapidly and efficiently disseminated in a broadcast manner, such as micro-clusters, QQ clusters and microblogs, and the presence of the groups can also promote individuals to carry out closed discussions on the information, and the discussions can have fermentation or inhibition effects on the information dissemination.
Disclosure of Invention
In order to overcome the defect of false information prevention and control of the existing social network, the invention provides a false information propagation model implementation method based on the group, which is favorable for prevention, control and treatment of false information based on an independent cascade model and combined with the characteristic that people in the social network can widely participate in the group to discuss. The technical scheme adopted for solving the technical problems is as follows:
a group-based model building method for spurious information propagation, the method comprising the steps of:
s1, constructing a network: the network set is G= (V, E), and the node set and the edge set are V= { V respectively 1 ,v 2 ,…,v n Sum ofThe total number of nodes N;
s2, randomly selecting intelligent nodes of the part, and marking the set as V smart ;
S3, distributing the information filtering capability of the nodes: for set V smart The probability of receiving false information is 0, and the probability of receiving false information for a common node is P n ;
S4, setting the transition probability among the node states;
s5, a cascade information propagation-based method comprises the following steps: there are three different states for each node in the model: 0 (susceptibility), 1 (adoption), 2 (immunization), and information transmission is carried out from the adopted node, the node transmits the information to a group taking the node as a center (the group is constructed by any one node and a first-order neighbor thereof), the information is transmitted layer by layer, and when all nodes in the network are traversed completely, the information is stopped;
s6, calculating information propagation range indexes: and calculating the average value of false information propagation ranges under different proportion intelligent nodes and different silencing probabilities to obtain a final propagation result.
The scale of the network described in the stated step S1 is n=5000, the average degree k=10, and the initial states of all nodes are set as the susceptibility (state=0).
The stated step S2 specifically includes: randomly selecting a part of nodes in the network as intelligent nodes (the intelligent nodes in the group do not send out comments with silencing probability lambda or comment with 1-lambda, issue own questions on false information, influence the decision of individuals in the group) and adding the intelligent nodes into a set V smart The rest nodes are common nodes.
The stated step S3 specifically includes:
s3.1 initial probability P of intelligent node accepting false information S =0;
S3.2, the initial probability that the common node receives false information is a random number P in a range of intervals n ∈(0,0.5)。
The step S4 specifically includes:
s4.1, the probability P will be after receiving the message by the susceptible person (state=0) n λ k Converting to a taker (state=1), wherein k represents the number of intelligent nodes in the group, and the greater the silencing probability lambda of the intelligent nodes, the greater the probability of the susceptible person converting to the taker in the case that the number of intelligent nodes in the group is k; meanwhile, under the condition of the silencing probability of given intelligent nodes, the probability that the susceptible person is converted into the adoption person is smaller as the intelligent nodes k in the group are more;
s4.2, the users in the group are also influenced by the comments of the intelligent nodes, thereby the information is processedDoubt about the authenticity of each of the employers (state=1) with probability 1- λ k Converted to immunity (state=2) with probability λ k Remain unchanged (state=1);
the probability formula is set as follows:
P 0→1 =P n λ k (1)
P 0→2 =1-P n λ k (2)
P 1→1 =λ k (3)
P 1→2 =1-λ k (4)
wherein P is 0→1 Probability of the susceptible node being converted into the adopted node, P 0→2 Is the probability of a susceptible node being converted into an immune node, P 1→1 Is the probability of adopting the node to maintain the self state, P 1→2 The probability of a node being converted to an immune node is employed.
The stated step S5 specifically includes:
s5.1, randomly selecting a node as an initial adopted node, and starting information propagation from the adopted node, wherein the node forwards information to a group (the group is composed of a current node and a first-order neighbor thereof) centering on the node;
s5.2, the adopter-centered group is denoted as V i The method comprises the steps of carrying out a first treatment on the surface of the Node set is adopted in the network and is marked as V adopted The method comprises the steps of carrying out a first treatment on the surface of the The node set immunized in the network is denoted as V immune The method comprises the steps of carrying out a first treatment on the surface of the The node set of each step of newly adopted information in the network is marked as V new_adopted The method comprises the steps of carrying out a first treatment on the surface of the The set of temporary storage nodes is denoted as V temp The method comprises the steps of carrying out a first treatment on the surface of the When a certain node i forwards information, every node in the group can see the information, and the node i can send the information with probability P i Forwarding the information, the process is as follows:
s5.3, randomly selecting a node i from a common node set, taking the node i as an adopted node (state=1) as a source of information transmission, forwarding false information, and adding the node i to V adopted And V new_adopted In (1), V new_adopted The node in (a) is added to V temp In (a) and (b);
s5.4 from V temp Any node i, and group centered on i is denoted as V i Calculating the number of intelligent nodes in the group, denoted as k, for any one belonging to V i According to the network information propagation model, calculating the probability of the nodes receiving the information, and when no intelligent node exists in the group or no comment is issued, propagating according to a general independent cascade model;
s5.5, traversing nodes in the group, and generating a random number random of 0-1 for each susceptible node i; if P i If not less than random, forwarding the node i, and adding the node i to V new_adopted Node turns into adoption node (state=1); if P i If less than random, node i does not forward, node i enters V immune Node conversion to immune node (state=2);
s5.6, for the infected nodes in the group, generating a random number random of 0-1, if P i =λ k The nodes i keep the state unchanged if the nodes are not less than random; if P i =λ k If less than random, node i does not forward, node i enters V immune And set V adopted Node i, node state transitions to immune node (state=2);
s5.7, mix V temp Node in (1) is emptied and V is set new_adopted The node in (a) is added to V adopted And V temp In which steps S5.4-S5.7 are repeated continuously, when V new_adopted When no node exists, stopping the algorithm, and indicating that the information transmission is finished at the moment; v (V) adopted Representing a final adopted node set;
s5.8, continuously repeating the steps S5.3-S5.7 until the iteration number reaches 1000, and recording the total propagation number;
s5.9, changing the proportion r of the intelligent nodes, repeating the steps S3-S6 of the silencing probability of the intelligent nodes, and recording the propagation times under each condition.
The stated step S6 specifically includes:
s6.1, recording the final number of the adopters as N', wherein the transmission range of the false information is as follows:
s6.2, obtaining different intelligent node proportions r and propagation conditions of different networks under different intelligent node silencing probabilities lambda.
The beneficial effects of the invention are as follows:
a method for constructing a false information propagation model based on a group is provided, and the role of intelligent nodes in the group is explained. The model can help researchers better understand the relation between the statement of the intelligent node in the group and the existence of the group and the false information propagation range, and can provide thought for suppressing the false information propagation.
Drawings
The accompanying drawings are included to provide a visual representation of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention.
FIG. 1 is an algorithm flow chart of a method for constructing a group-based false information propagation model according to the present invention;
FIG. 2 is a graph showing the variation of false information propagation range with the probability of silencing of intelligent nodes at different p values in a random network;
FIG. 3 is a graph of the range of spurious information propagation over time at different lambda values in a random network;
FIG. 4 is a graph showing the variation of probability p of false information propagation range with common node acceptance information at different lambda and r values in a random network;
FIG. 5 is a graph showing the variation of the information propagation range with the probability of silencing of intelligent nodes at different p values in a scaleless network;
FIG. 6 is a graph showing the variation of the information propagation range with the probability of silencing of intelligent nodes at different p values in a real network.
Detailed Description
The following describes the embodiments of the present invention in further detail with reference to the drawings.
Example 1
Referring to fig. 1 to 6, the invention selects three different structure networks, a random network, a scaleless network and a real network as experimental networks. The network is simple in structure, but representatively can help researchers to better understand the role of intelligent nodes and understand false information propagation based on groups.
In this embodiment, a method for constructing a model for false message propagation based on a group includes the following specific steps:
a group-based model building method for spurious information propagation, the method comprising the steps of:
s1, constructing a network: the network set is G= (V, E), and the node set and the edge set are V= { V respectively 1 ,v 2 ,…,v n Sum ofThe total number N of nodes comprises the following specific steps:
s1.1, constructing a random network, wherein the scale of the network is n=5000, the average degree k=10, and the initial states of all nodes are set as susceptible persons (state=0).
S2, randomly selecting intelligent nodes with a certain proportion, and marking the set as V smart The method comprises the following specific steps of:
s2.1, randomly selecting a part of nodes in the network as intelligent nodes (the intelligent nodes in the group do not send out comments by silencing probability lambda or comment by 1-lambda, issue own questions of false information, influence individual decisions in the group) and adding the nodes into a set V smart The rest nodes are common nodes.
S3, distributing the information filtering capability of the nodes: for set V smart The probability of receiving false information is 0, and the probability of receiving false information for a common node is P n The method comprises the following specific steps:
s3.1 initial probability P of intelligent node accepting false information S =0;
S3.2, the initial probability that the common node receives false information is a random number P in a range of intervals n ∈(0,0.5)。
S4, setting the transition probability among node states, wherein the method comprises the following specific steps of:
s4.1, the probability P will be after receiving the message by the susceptible person (state=0) n λ k Converting to a taker (state=1), wherein k represents the number of intelligent nodes in the group, and the greater the silencing probability lambda of the intelligent nodes, the greater the probability of the susceptible person converting to the taker in the case that the number of intelligent nodes in the group is k; meanwhile, under the condition of the silencing probability of given intelligent nodes, the probability that the susceptible person is converted into the adoption person is smaller as the intelligent nodes k in the group are more;
the owners in S4.2 group are also affected by the comments of the intelligent nodes, so that doubt is made about the authenticity of the information, and each owner (state=1) has a probability of 1-lambda k Converted to immunity (state=2) with probability λ k Remain unchanged (state=1);
the probability formula is set as follows:
P o→1 =P n λ k (1)
P o→2 =1-P n λ k (2)
P 1→1 =λ k (3)
P 1→2 =1-λ k (4)
wherein P is 0→1 Probability of the susceptible node being converted into the adopted node, P 0→2 Is the probability of a susceptible node being converted into an immune node, P 1→1 Is the probability of adopting the node to maintain the self state, P 1→2 The probability of a node being converted to an immune node is employed.
S5, a cascade information propagation-based method comprises the following steps: there are three different states for each node in the model: 0 (susceptibility), 1 (adoption), 2 (immunization), and information transmission is carried out from the adoption node, the node transmits the information to a group taking the node as a center (the group is constructed by any one node and a first-order neighbor thereof), the information is transmitted layer by layer, and when all nodes in a network are traversed completely, the information is stopped, and the specific steps are as follows:
s5.1, randomly selecting a node as an initial adopted node, and starting information propagation from the adopted node, wherein the node forwards information to a group (the group is composed of a current node and a first-order neighbor thereof) centering on the node;
s5.2, the adopter-centered group is denoted as V i The method comprises the steps of carrying out a first treatment on the surface of the Node set is adopted in the network and is marked as V adopted The method comprises the steps of carrying out a first treatment on the surface of the The node set immunized in the network is denoted as V immune The method comprises the steps of carrying out a first treatment on the surface of the The node set of each step of newly adopted information in the network is marked as V new _ adopted The method comprises the steps of carrying out a first treatment on the surface of the The set of temporary storage nodes is denoted as V temp The method comprises the steps of carrying out a first treatment on the surface of the When a certain node i forwards information, every node in the group can see the information, and the node i can send the information with probability P i Forwarding the information, the process is as follows:
s5.3, randomly selecting a node i from a common node set, taking the node i as an adopted node (state=1) as a source of information transmission, forwarding false information, and adding the node i to V adopted And V new_adopted In (1), V new_adopted The node in (a) is added to V temp In (a) and (b);
s5.4 from V temp Any node i, and group centered on i is denoted as V i Calculating the number of intelligent nodes in the group, denoted as k, for any one belonging to V i According to the network information propagation model, calculating the probability of the nodes receiving the information, and when no intelligent node exists in the group or no comment is issued, propagating according to a general independent cascade model;
s5.5, traversing nodes in the group, and generating a random number random of 0-1 for each susceptible node i; if P i If not less than random, forwarding the node i, and adding the node i to V new_adopted Node turns into adoption node (state=1); if P i If less than random, node i does not forward, node i enters V immune Node conversion to immune node (state=2);
s5.6, for the infected nodes in the group, generating a random number random of 0-1, if P i =λ k The nodes i keep the state unchanged if the nodes are not less than random; if P i =λ k If less than random, node i does not forward, node i enters V immune And set V adopted Node i, node state transitions to immune node (state=2);
s5.7, mix V temp Node in (1) is emptied and V is set new_adopted The node in (a) is added to V adopted And V twmp In which steps S5.4-S5.7 are repeated continuously, when V new_adopted When no node exists, stopping the algorithm, and indicating that the information transmission is finished at the moment; v (V) adopted Representing a final adopted node set;
s5.8, continuously repeating the steps S5.3-S5.7 until the iteration number reaches 1000, and recording the total propagation number;
s5.9, changing the proportion r of the intelligent nodes, repeating the steps S3-S6 of the silencing probability of the intelligent nodes, and recording the propagation times under each condition.
S6, calculating information propagation range indexes: calculating the average value of false information propagation ranges under different proportion intelligent nodes and different silencing probabilities to obtain a final propagation result, wherein the method comprises the following specific steps:
s6.1, recording the final number of the adopters as N', wherein the transmission range of the false information is as follows:
s6.2, obtaining different intelligent node proportions r and propagation conditions of different networks under different intelligent node silencing probabilities lambda.
FIG. 2 is a graph showing the variation of false information propagation range with the probability of silencing of intelligent nodes at different p values in a random network. Fig. 3 is a graph of the spread range of spurious information over time at different lambda values in a random network. Fig. 4 is a graph showing the variation of the probability p of false information propagation range with the acceptance of information by a common node in a random network with different lambda and r values. Fig. 5 and 6 are graphs showing the variation of the information propagation range with the probability of silencing of the intelligent node in the scaleless network and the real network, respectively, with different p values. As can be seen from fig. 2, when the probability of silencing of the intelligent node is greater than a certain threshold, false information can be propagated. Comparing fig. 2,5, and 6, it can be seen that spurious information is more difficult to propagate out in a scaleless network, and a larger threshold exists. Fig. 3 shows that with increasing time steps the spread of spurious information expands rapidly, and the network then remains stationary. As λ increases, the range of spurious information propagation gradually decreases. FIG. 4 shows that the greater the number of intelligent nodes in the network, the more difficult the spurious information is to propagate, and that spurious information can only propagate if it is greater than a certain threshold.
As described above, for the embodiments of the present invention on random networks and scale-free networks as well as real networks, we propose a method for constructing a group-based false information propagation model, when intelligent nodes exist in a social network, the language of the intelligent nodes may affect the nodes in the group. Based on the method, through combining with simulation experiments, the model can help researchers to better know the effect of the intelligent nodes in group propagation and play the role of suppressing false information propagation by the intelligent nodes.
Example 2
The embodiment provides a false information propagation inhibition method of a group-based false information propagation model construction method, which comprises the following steps:
steps S1 to S6 of this embodiment are the same as those of embodiment 1, and further include the steps of:
s7, a specific application method. The method comprises the following specific steps:
s7.1, selecting the nodes with influence in the social network as intelligent nodes, such as selecting professors of well-known universities, experts and the like, wherein the people have relative authorities and learning, and the language of the people has more public confidence and the attribute of the intelligent nodes.
S7.2, people with influence make a speaking and publishing. When spurious information is seen in the network, they can issue views about the spurious information on a circle of friends, a micro-community or micro-blogging platform, etc., to influence the decisions of surrounding masses.
S7.3, elimination of false information. When the true language with respect to the false information starts to spread in the network, those masses who would believe the false information start to no longer information the false information and do not disseminate the information. Over time, false information will not reach cascading phenomena in the network, i.e. only small-scale propagation. Thereby achieving the purpose of suppressing the propagation of information.
The above embodiments are only examples of the present invention, and are not intended to limit the present invention, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (7)
1. A model construction method for false information propagation based on groups comprises the following steps:
s1, constructing a network: the network set is G= (V, E), and the node set and the edge set are V= { V respectively 1 ,v 2 ,…,v n Sum ofThe total number of nodes N;
s2, randomly selecting intelligent nodes of the part, and marking the set as V smart ;
S3, distributing the information filtering capability of the nodes: for set V smart The probability of receiving false information is 0, and the probability of receiving false information for a common node is P n ;
S4, setting the transition probability among the node states;
s5, a cascade information propagation-based method comprises the following steps: there are three different states for each node in the model: 0 (susceptibility), 1 (adoption), 2 (immunization), and information transmission is carried out from the adopted node, the node transmits the information to a group taking the node as a center (the group is constructed by any one node and a first-order neighbor thereof), the information is transmitted layer by layer, and when all nodes in the network are traversed completely, the information is stopped;
s6, calculating information propagation range indexes: and calculating the average value of false information propagation ranges under different proportion intelligent nodes and different silencing probabilities to obtain a final propagation result.
2. The method of claim 1, wherein the network in step S1 has a size of n=5000, an average degree of k=10, and an initial state of all nodes is set to be a susceptible (state=0).
3. The method of claim 1, wherein in step S2, part of the intelligent nodes are selected randomly, the intelligent nodes in the group do not send comments with silencing probability λ, or comment with 1- λ, and issue own questions about the false information to influence the decisions of individuals in the group, namely: randomly selecting a part of nodes in the network as intelligent nodes and adding the intelligent nodes into the set V smart The rest nodes are common nodes.
4. The method for constructing a model for false information propagation according to claim 1, wherein in the step S3, the capability of filtering information of the node is allocated, and the specific steps are as follows:
s3.1 initial probability P of intelligent node accepting false information S =0;
S3.2, the initial probability that the common node receives false information is a random number P in a range of intervals n ∈(0,0.5)。
5. The method for constructing a model for false information propagation based on group as claimed in claim 1, wherein in said step S4, the probability of transition between node states is set as follows:
s4.1, the probability P will be after receiving the message by the susceptible person (state=0) n λ k Converting to a taker (state=1), wherein k represents the number of intelligent nodes in the group, and the greater the silencing probability lambda of the intelligent nodes, the greater the probability of the susceptible person converting to the taker in the case that the number of intelligent nodes in the group is k; at the same time give intelligenceUnder the condition of the silencing probability of the intelligent nodes, the more intelligent nodes k in the group, the smaller the probability that the susceptible person is converted into the adoption person;
the owners in S4.2 group are also affected by the comments of the intelligent nodes, so that doubt is made about the authenticity of the information, and each owner (state=1) has a probability of 1-lambda k Converted to immunity (state=2) with probability λ k Remain unchanged (state=1);
the probability formula is set as follows:
P 0→1 =P n λ k (1)
P 0→2 =1-P n λ k (2)
P 1→1 =λ k (3)
P 1→2 =1-λ k (4)
wherein P is 0→1 Probability of the susceptible node being converted into the adopted node, P 0→2 Is the probability of a susceptible node being converted into an immune node, P 1→1 Is the probability of adopting the node to maintain the self state, P 1→2 The probability of a node being converted to an immune node is employed.
6. The method for constructing a model for false information propagation based on a group as claimed in claim 1, wherein in the step S5, the method for learning based on cascade information propagation comprises the following specific steps:
s5.1, randomly selecting a node as an initial adopted node, and starting information propagation from the adopted node, wherein the node forwards information to a group (the group is composed of a current node and a first-order neighbor thereof) centering on the node;
s5.2, the adopter-centered group is denoted as V i The method comprises the steps of carrying out a first treatment on the surface of the Node set is adopted in the network and is marked as V adopted The method comprises the steps of carrying out a first treatment on the surface of the The node set immunized in the network is denoted as V immune The method comprises the steps of carrying out a first treatment on the surface of the The node set of each step of newly adopted information in the network is marked as V new_adopted The method comprises the steps of carrying out a first treatment on the surface of the The set of temporary storage nodes is denoted as V temp The method comprises the steps of carrying out a first treatment on the surface of the After a certain node i forwards the information, each node in the groupThe points can see the information while node i will see the probability P i Forwarding the information, the process is as follows:
s5.3, randomly selecting a node i from a common node set, taking the node i as an adopted node (state=1) as a source of information transmission, forwarding false information, and adding the node i to V adopted And V new_adopted In (1), V new_adopted The node in (a) is added to V temp In (a) and (b);
s5.4 from V temp Any node i, and group centered on i is denoted as V i Calculating the number of intelligent nodes in the group, denoted as k, for any one belonging to V i According to the network information propagation model, calculating the probability of the nodes receiving the information, and when no intelligent node exists in the group or no comment is issued, propagating according to a general independent cascade model;
s5.5, traversing nodes in the group, and generating a random number random of 0-1 for each susceptible node i; if P i If not less than random, forwarding the node i, and adding the node i to V new_adopted Node turns into adoption node (state=1); if P i <random, node i does not forward, node i enters V immune Node conversion to immune node (state=2);
s5.6, for the infected nodes in the group, generating a random number random of 0-1, if P i =λ k The nodes i keep the state unchanged if the nodes are not less than random; if P i =λ k <random, node i does not forward, node i enters V immune And set V adopted Node i, node state transitions to immune node (state=2);
s5.7, mix V temp Node in (1) is emptied and V is set new_adopted The node in (a) is added to V adopted And V temp In which steps S5.4-S5.7 are repeated continuously, when V new_adopted When no node exists, stopping the algorithm, and indicating that the information transmission is finished at the moment; v (V) adopted Representing a final adopted node set;
s5.8, continuously repeating the steps S5.3-S5.7 until the iteration number reaches 1000, and recording the total propagation number;
s5.9, changing the proportion r of the intelligent nodes, repeating the steps S3-S6 of the silencing probability of the intelligent nodes, and recording the propagation times under each condition.
7. The method for constructing a model for false information propagation based on group as claimed in claim 1, wherein in the step S6, an information propagation range index is calculated, specifically comprising the steps of:
s6.1, recording the final number of the adopters as N', wherein the transmission range of the false information is as follows:
s6.2, obtaining different intelligent node proportions r and propagation conditions of different networks under different intelligent node silencing probabilities lambda.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310260022.0A CN116468569A (en) | 2023-03-17 | 2023-03-17 | Group-based model construction method for false information propagation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310260022.0A CN116468569A (en) | 2023-03-17 | 2023-03-17 | Group-based model construction method for false information propagation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116468569A true CN116468569A (en) | 2023-07-21 |
Family
ID=87174288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310260022.0A Pending CN116468569A (en) | 2023-03-17 | 2023-03-17 | Group-based model construction method for false information propagation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116468569A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116682574A (en) * | 2023-08-03 | 2023-09-01 | 深圳市震有智联科技有限公司 | Health management method and system for associated crowd |
-
2023
- 2023-03-17 CN CN202310260022.0A patent/CN116468569A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116682574A (en) * | 2023-08-03 | 2023-09-01 | 深圳市震有智联科技有限公司 | Health management method and system for associated crowd |
CN116682574B (en) * | 2023-08-03 | 2023-11-24 | 深圳市震有智联科技有限公司 | Health management method and system for associated crowd |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103064917B (en) | The high-impact customer group of a kind of specific tendency towards microblogging finds method | |
CN110781411B (en) | Rumor propagation control method based on rumor splitting message | |
Hota et al. | Game-theoretic vaccination against networked SIS epidemics and impacts of human decision-making | |
CN109120460B (en) | Mobile node-based rumor-avoiding method in social network | |
CN116468569A (en) | Group-based model construction method for false information propagation | |
Beskow et al. | Agent based simulation of bot disinformation maneuvers in Twitter | |
CN109934727A (en) | Network gossip propagation suppressing method, device, equipment and readable storage medium storing program for executing | |
CN112507245A (en) | Social network friend recommendation method based on graph neural network | |
CN108322328B (en) | Method for constructing network virus diffusion model based on infectious disease dynamics | |
CN111294242A (en) | Multi-hop learning method for improving cooperation level of multi-agent system | |
CN106530097A (en) | Oriented social network key propagation node discovering method based on random walking mechanism | |
Yu et al. | [Retracted] Explore the Conflict and Resolution of Pollution NIMBY Facility Construction in the Context of New Media: An Evolutionary Game Theoretical Approach | |
CN109086310A (en) | A kind of gossip propagation model building method merging personal behavior and social interaction | |
Hurwitz | Gender and race in the Occupy movement: Relational leadership and discriminatory resistance | |
CN111079024B (en) | Public opinion propagation model construction method based on reinforced effect SCIR network | |
CN107798623A (en) | Media intervene lower three points of opinion colonies network public-opinion propagation model | |
CN111414552A (en) | Method for estimating propagation range of online social network rumors | |
Chen et al. | Impact of heterogeneity on opinion dynamics: Heterogeneous interaction model | |
CN113870043B (en) | Information propagation control method based on user awareness and evolution game | |
CN113569188B (en) | DI-SCIR-based double-layer coupling social network public opinion propagation model construction method | |
Xu et al. | Information dissemination model of microblogging with Internet marketers | |
CN115757983A (en) | Method, equipment and medium for constructing rumor propagation model considering propellers | |
CN115422738A (en) | Modeling method, simulation method and system of self-media message propagation simulation model | |
Filippov et al. | Online protest mobilization: building a computational model | |
CN108400883B (en) | Social layering model implementation method based on network information flow |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |