Multilevel User Credibility Assessment in Social Networks (2309.13305v1)
Abstract: Online social networks are one of the largest platforms for disseminating both real and fake news. Many users on these networks, intentionally or unintentionally, spread harmful content, fake news, and rumors in fields such as politics and business. As a result, numerous studies have been conducted in recent years to assess the credibility of users. A shortcoming of most of existing methods is that they assess users by placing them in one of two categories, real or fake. However, in real-world applications it is usually more desirable to consider several levels of user credibility. Another shortcoming is that existing approaches only use a portion of important features, which downgrades their performance. In this paper, due to the lack of an appropriate dataset for multilevel user credibility assessment, first we design a method to collect data suitable to assess credibility at multiple levels. Then, we develop the MultiCred model that places users at one of several levels of credibility, based on a rich and diverse set of features extracted from users' profile, tweets and comments. MultiCred exploits deep LLMs to analyze textual data and deep neural models to process non-textual features. Our extensive experiments reveal that MultiCred considerably outperforms existing approaches, in terms of several accuracy measures.
- N. Singh, T. Sharma, A. Thakral, and T. Choudhury, “Detection of fake profile in online social networks using machine learning,” in 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018, pp. 231–234.
- M. A. Wani, N. Agarwal, S. Jabin, and S. Z. Hussain, “Analyzing real and fake users in facebook network based on emotions,” in 11th International Conference on Communication Systems & Networks, COMSNETS 2019, Bengaluru, India, January 7-11, 2019. IEEE, 2019, pp. 110–117. [Online]. Available: https://doi.org/10.1109/COMSNETS.2019.8711124
- K. Zarei, R. Farahbakhsh, and N. Crespi, “Deep dive on politician impersonating accounts in social media,” in 2019 IEEE Symposium on Computers and Communications, ISCC 2019, Barcelona, Spain, June 29 - July 3, 2019. IEEE, 2019, pp. 1–6. [Online]. Available: https://doi.org/10.1109/ISCC47284.2019.8969645
- P. Wanda and H. J. Jie, “Deepprofile: Finding fake profile in online social network using dynamic CNN,” J. Inf. Secur. Appl., vol. 52, p. 102465, 2020. [Online]. Available: https://doi.org/10.1016/j.jisa.2020.102465
- K. K. Bharti and S. Pandey, “Fake account detection in twitter using logistic regression with particle swarm optimization,” Soft Comput., vol. 25, no. 16, pp. 11 333–11 345, 2021. [Online]. Available: https://doi.org/10.1007/s00500-021-05930-y
- M. M. Swe and N. N. Myo, “Fake accounts detection on twitter using blacklist,” in 17th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2018, Singapore, Singapore, June 6-8, 2018. IEEE Computer Society, 2018, pp. 562–566. [Online]. Available: https://doi.org/10.1109/ICIS.2018.8466499
- E. M. Clark, J. R. Williams, C. A. Jones, R. A. Galbraith, C. M. Danforth, and P. S. Dodds, “Sifting robotic from organic text: A natural language approach for detecting automation on twitter,” J. Comput. Sci., vol. 16, pp. 1–7, 2016. [Online]. Available: https://doi.org/10.1016/j.jocs.2015.11.002
- M. U. S. Khan, M. Ali, A. Abbas, S. U. Khan, and A. Y. Zomaya, “Segregating spammers and unsolicited bloggers from genuine experts on twitter,” IEEE Trans. Dependable Secur. Comput., vol. 15, no. 4, pp. 551–560, 2018. [Online]. Available: https://doi.org/10.1109/TDSC.2016.2616879
- P. V. Phad and M. K. Chavan, “Detecting compromised high-profile accounts on social networks,” in 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, Bengaluru, India, July 10-12, 2018. IEEE, 2018, pp. 1–4. [Online]. Available: https://doi.org/10.1109/ICCCNT.2018.8493851
- A.-Z. Ala’M, J. Alqatawna, and H. Paris, “Spam profile detection in social networks based on public features,” in 2017 8th International Conference on information and Communication Systems (ICICS). IEEE, 2017, pp. 130–135.
- M. Z. Alom, B. Carminati, and E. Ferrari, “Detecting spam accounts on twitter,” in IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, Barcelona, Spain, August 28-31, 2018, U. Brandes, C. Reddy, and A. Tagarelli, Eds. IEEE Computer Society, 2018, pp. 1191–1198. [Online]. Available: https://doi.org/10.1109/ASONAM.2018.8508495
- R. Aswani, A. K. Kar, and P. V. Ilavarasan, “Detection of spammers in twitter marketing: A hybrid approach using social media analytics and bio inspired computing,” Inf. Syst. Frontiers, vol. 20, no. 3, pp. 515–530, 2018. [Online]. Available: https://doi.org/10.1007/s10796-017-9805-8
- K. S. Adewole, N. B. Anuar, A. Kamsin, and A. K. Sangaiah, “SMSAD: a framework for spam message and spam account detection,” Multim. Tools Appl., vol. 78, no. 4, pp. 3925–3960, 2019. [Online]. Available: https://doi.org/10.1007/s11042-017-5018-x
- P. K. Verma, P. Agrawal, V. Madaan, and C. Gupta, “Ucred: fusion of machine learning and deep learning methods for user credibility on social media,” Soc. Netw. Anal. Min., vol. 12, no. 1, p. 54, 2022. [Online]. Available: https://doi.org/10.1007/s13278-022-00880-1
- J. Devlin, M. Chang, K. Lee, and K. Toutanova, “BERT: pre-training of deep bidirectional transformers for language understanding,” in Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019, Minneapolis, MN, USA, June 2-7, 2019, Volume 1 (Long and Short Papers), J. Burstein, C. Doran, and T. Solorio, Eds. Association for Computational Linguistics, 2019, pp. 4171–4186. [Online]. Available: https://doi.org/10.18653/v1/n19-1423
- K. Fukushima, “Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position,” Biological Cybernetics, vol. 36, pp. 193–202, 1980.
- F. C. Akyon and M. E. Kalfaoglu, “Instagram fake and automated account detection,” in 2019 Innovations in intelligent systems and applications conference (ASYU). IEEE, 2019, pp. 1–7.
- S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, “Fame for sale: efficient detection of fake twitter followers,” Decision Support Systems, vol. 80, pp. 56–71, December 2015.
- K. Shu, D. Mahudeswaran, S. Wang, D. Lee, and H. Liu, “Fakenewsnet: A data repository with news content, social context and dynamic information for studying fake news on social media,” arXiv preprint arXiv:1809.01286, 2019.
- T. Alhindi, S. Petridis, and S. Muresan, “Where is your evidence: Improving fact-checking by justification modeling,” in Proceedings of the First Workshop on Fact Extraction and VERification (FEVER), 2018, pp. 85–90.
- A. D’Ulizia, M. C. Caschera, F. Ferri, and P. Grifoni, “Fake news detection: a survey of evaluation datasets,” PeerJ Comput. Sci., vol. 7, p. e518, 2021. [Online]. Available: https://doi.org/10.7717/peerj-cs.518
- [Online]. Available: https://www.newsguardtech.com/
- J. Schmidhuber, “Deep learning in neural networks: An overview,” Neural networks, vol. 61, pp. 85–117, 2015.
- V. Sanh, L. Debut, J. Chaumond, and T. Wolf, “Distilbert, a distilled version of BERT: smaller, faster, cheaper and lighter,” CoRR, vol. abs/1910.01108, 2019. [Online]. Available: http://arxiv.org/abs/1910.01108
- N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: synthetic minority over-sampling technique,” J. Artif. Intell. Res., vol. 16, pp. 321–357, 2002. [Online]. Available: https://doi.org/10.1613/jair.953
- Mohammad Moradi (5 papers)
- Mostafa Haghir Chehreghani (25 papers)