| Literature DB >> 35361801 |
YanXia Liu1, WeiMin Li1, Chao Yang2, JianJia Wang1.
Abstract
The rapid development of social networking platforms has accelerated the spread of false information. Effective source location methods are essential to control the spread of false information. Most existing methods fail to make full use of the infection of neighborhood information in nodes, resulting in a poor source localization effect. In addition, most existing methods ignore the existence of multiple source nodes in the infected cluster and hard to identify the source nodes comprehensively. To solve these problems, we propose a new method about the multiple sources location with the neighborhood entropy. The method first defines the two kinds of entropy, i.e. infection adjacency entropy and infection intensity entropy, depending on whether neighbor nodes are infected or not. Then, the possibility of a node is evaluated by the neighborhood entropy. To locate the source nodes comprehensively, we propose a source location algorithm with the infected clusters. Other unrecognized source nodes in the infection cluster are identified by the cohesion of nodes, which can deal with the situation in the multiple source nodes in an infected cluster. We conduct experiments on various network topologies. Experimental results show that the two proposed algorithms outperform the existing methods.Entities:
Mesh:
Year: 2022 PMID: 35361801 PMCID: PMC8971423 DOI: 10.1038/s41598-022-09229-2
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Notations.
| Notation | Description |
|---|---|
| Neighbor node set of node | |
| Infection probability from node | |
| Probability of node | |
| All infected nodes | |
| Infected (Uninfected) neighbor nodes of node | |
| Infection intensity of node | |
| Infection degree of node | |
| Contribution of node | |
| Infection intensity entropy of node | |
| Infection adjacency entropy of node | |
| Neighborhood entropy of node | |
| Core convex set | |
| The similarity between node | |
| Cohesion strength of node | |
| Predicted source nodes |
Figure 1Diffusion network. Red node 1 represents the source node, blue node is the domain node of node 1, and each dotted box represents the domain of the blue node.
The topology properties of networks.
| DataSet | | | | | |||
|---|---|---|---|---|---|
| Karate | 34 | 78 | 2.41 | 4.60 | 0.570 |
| Dolphin | 62 | 159 | 3.36 | 5.13 | 0.259 |
| Celegans | 453 | 2025 | 2.66 | 8.94 | 0.646 |
| 4039 | 88,234 | 3.69 | 43.69 | 0.606 | |
| Git | 37,700 | 289,003 | 3.25 | 15.33 | 0.168 |
| Gowalla | 196,591 | 950,327 | 4.627 | 9.668 | 0.237 |
|V| and |E| denote the number of nodes and edges in the network, respectively. denotes the average length of all shortest paths. denotes the network average. denotes the average clustering coefficient of the network.
Figure 2Source location accuracy.
Figure 3Average error distance.
Figure 4Location accuracy of the number of source nodes.
Figure 5Sources localization accuracy in synthetic networks. (a–d) Results in ER network. The scale of the network is N = 500, 1000 respectively, the node infection rate is 0.1, 0.2 respectively, the average degree is 8, 10, 12 respectively. (e–h) Results in BA network. The number of source nodes is 5.