Rumor Detection with a novel graph neural network approach
- URL: http://arxiv.org/abs/2403.16206v3
- Date: Tue, 2 Apr 2024 01:52:13 GMT
- Title: Rumor Detection with a novel graph neural network approach
- Authors: Tianrui Liu, Qi Cai, Changxin Xu, Bo Hong, Fanghao Ni, Yuxin Qiao, Tsungwei Yang,
- Abstract summary: We propose a new detection model, that jointly learns the representations of user correlation and information propagation to detect rumors on social media.
Specifically, we leverage graph neural networks to learn the representations of user correlation from a bipartite graph.
We show that it requires a high cost for attackers to subvert user correlation pattern, demonstrating the importance of considering user correlation for rumor detection.
- Score: 12.42658463552019
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The wide spread of rumors on social media has caused a negative impact on people's daily life, leading to potential panic, fear, and mental health problems for the public. How to debunk rumors as early as possible remains a challenging problem. Existing studies mainly leverage information propagation structure to detect rumors, while very few works focus on correlation among users that they may coordinate to spread rumors in order to gain large popularity. In this paper, we propose a new detection model, that jointly learns both the representations of user correlation and information propagation to detect rumors on social media. Specifically, we leverage graph neural networks to learn the representations of user correlation from a bipartite graph that describes the correlations between users and source tweets, and the representations of information propagation with a tree structure. Then we combine the learned representations from these two modules to classify the rumors. Since malicious users intend to subvert our model after deployment, we further develop a greedy attack scheme to analyze the cost of three adversarial attacks: graph attack, comment attack, and joint attack. Evaluation results on two public datasets illustrate that the proposed MODEL outperforms the state-of-the-art rumor detection models. We also demonstrate our method performs well for early rumor detection. Moreover, the proposed detection method is more robust to adversarial attacks compared to the best existing method. Importantly, we show that it requires a high cost for attackers to subvert user correlation pattern, demonstrating the importance of considering user correlation for rumor detection.
Related papers
- Predicting Viral Rumors and Vulnerable Users for Infodemic Surveillance [9.099277246096861]
We propose a novel approach to predict viral rumors and vulnerable users using a unified graph neural network model.
We pre-train network-based user embeddings and leverage a cross-attention mechanism between users and posts.
We also construct two datasets with ground-truth annotations on information virality and user vulnerability in rumor and non-rumor events.
arXiv Detail & Related papers (2024-01-18T04:57:12Z) - Rumor Detection with Self-supervised Learning on Texts and Social Graph [101.94546286960642]
We propose contrastive self-supervised learning on heterogeneous information sources, so as to reveal their relations and characterize rumors better.
We term this framework as Self-supervised Rumor Detection (SRD)
Extensive experiments on three real-world datasets validate the effectiveness of SRD for automatic rumor detection on social media.
arXiv Detail & Related papers (2022-04-19T12:10:03Z) - Deconfounded Training for Graph Neural Networks [98.06386851685645]
We present a new paradigm of decon training (DTP) that better mitigates the confounding effect and latches on the critical information.
Specifically, we adopt the attention modules to disentangle the critical subgraph and trivial subgraph.
It allows GNNs to capture a more reliable subgraph whose relation with the label is robust across different distributions.
arXiv Detail & Related papers (2021-12-30T15:22:35Z) - Rumor Detection on Twitter with Claim-Guided Hierarchical Graph
Attention Networks [5.167857972528786]
Rumors are rampant in the era of social media.
In this study, to substantially reinforces the interaction of user opinions, we first represent the conversation thread as an undirected interaction graph.
We then present a Claim-guided Hierarchical Graph Attention Network for rumor classification, which enhances the representation learning for responsive posts.
arXiv Detail & Related papers (2021-10-09T09:24:11Z) - Modelling Adversarial Noise for Adversarial Defense [96.56200586800219]
adversarial defenses typically focus on exploiting adversarial examples to remove adversarial noise or train an adversarially robust target model.
Motivated by that the relationship between adversarial data and natural data can help infer clean data from adversarial data to obtain the final correct prediction.
We study to model adversarial noise to learn the transition relationship in the label space for using adversarial labels to improve adversarial accuracy.
arXiv Detail & Related papers (2021-09-21T01:13:26Z) - HAT4RD: Hierarchical Adversarial Training for Rumor Detection on Social
Media [16.522234471615214]
Natural language is high-dimensional and sparse, and the same rumor may be expressed in hundreds of ways on social media.
We propose a novel textbfhierarchical textbfadversarial textbftraining method for textbfrumor textbfdetection (HAT4RD) on social media.
arXiv Detail & Related papers (2021-08-29T10:10:34Z) - SRLF: A Stance-aware Reinforcement Learning Framework for Content-based
Rumor Detection on Social Media [15.985224010346593]
Early content-based methods focused on finding clues from text and user profiles for rumor detection.
Recent studies combine the stances of users' comments with news content to capture the difference between true and false rumors.
We propose a novel Stance-aware Reinforcement Learning Framework (SRLF) to select high-quality labeled stance data for model training and rumor detection.
arXiv Detail & Related papers (2021-05-10T03:58:34Z) - Anomaly Detection-Based Unknown Face Presentation Attack Detection [74.4918294453537]
Anomaly detection-based spoof attack detection is a recent development in face Presentation Attack Detection.
In this paper, we present a deep-learning solution for anomaly detection-based spoof attack detection.
The proposed approach benefits from the representation learning power of the CNNs and learns better features for fPAD task.
arXiv Detail & Related papers (2020-07-11T21:20:55Z) - An Information Diffusion Approach to Rumor Propagation and
Identification on Twitter [0.0]
We study the dynamics of microscopic-level misinformation spread on Twitter.
Our findings confirm that rumor cascades run deeper and that rumor masked as news, and messages that incite fear, will diffuse faster than other messages.
arXiv Detail & Related papers (2020-02-24T20:04:54Z) - Adversarial Attack on Community Detection by Hiding Individuals [68.76889102470203]
We focus on black-box attack and aim to hide targeted individuals from the detection of deep graph community detection models.
We propose an iterative learning framework that takes turns to update two modules: one working as the constrained graph generator and the other as the surrogate community detection model.
arXiv Detail & Related papers (2020-01-22T09:50:04Z) - Rumor Detection on Social Media with Bi-Directional Graph Convolutional
Networks [89.13567439679709]
We propose a novel bi-directional graph model, named Bi-Directional Graph Convolutional Networks (Bi-GCN), to explore both characteristics by operating on both top-down and bottom-up propagation of rumors.
It leverages a GCN with a top-down directed graph of rumor spreading to learn the patterns of rumor propagation, and a GCN with an opposite directed graph of rumor diffusion to capture the structures of rumor dispersion.
arXiv Detail & Related papers (2020-01-17T15:12:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.