Tun Li;Yan Tang;Rong Xie;Yuqi Weng;Qian Li;Rong Wang;Chaolong Jia;Yunpeng Xiao
{"title":"A Malicious Information Popularity Prediction Model Based on User Influence","authors":"Tun Li;Yan Tang;Rong Xie;Yuqi Weng;Qian Li;Rong Wang;Chaolong Jia;Yunpeng Xiao","doi":"10.1109/TSC.2025.3544122","DOIUrl":null,"url":null,"abstract":"In social networks, studying methods for predicting the popularity of malicious information can help improve the ability to predict online public opinion. This paper proposes a malicious information popularity prediction model based on user influence, targeting the cooperative adversarial nature of malicious information propagation, the problem of assessing user influence in malicious information propagation space, and the complexity of malicious information propagation space. First, regarding the cooperative adversarial nature of the malicious information propagation process, considering that user behavior is influenced by both malicious and positive information during the propagation process, evolutionary game theory and multiple linear regression are introduced, and internal and external behavioral factors of the user are synthesized to construct influential functions that quantify malicious information and positive information. Meanwhile, the influence matrix is introduced when quantifying information to construct a weighted malicious information propagation network further. Second, regarding the problem of assessing user influence in the malicious information propagation space, considering the advantages of PageRank in measuring the importance of web pages and combining the timeliness of malicious information propagation, an improved algorithm T-PageRank (Timeliness-PageRank) based on timeliness is proposed. Introducing the time decay factor into the PageRank algorithm effectively enhances the accuracy and timeliness of the influence assessment of malicious information propagation. Finally, regarding the complexity of the propagation space of malicious information and considering that Graph Attention Network (GAT) can effectively capture complex relationships between nodes, combined with user influence, a malicious information popularity prediction model based on GAT is constructed. The model learns the complex interaction between users by using GAT and updates the feature representation of users so that it can be used for subsequent malicious information popularity prediction tasks. The experiment shows that the model can not only accurately assess the influence of users but also effectively predict the popularity of malicious information propagation.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"18 2","pages":"543-556"},"PeriodicalIF":5.5000,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Services Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10896826/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In social networks, studying methods for predicting the popularity of malicious information can help improve the ability to predict online public opinion. This paper proposes a malicious information popularity prediction model based on user influence, targeting the cooperative adversarial nature of malicious information propagation, the problem of assessing user influence in malicious information propagation space, and the complexity of malicious information propagation space. First, regarding the cooperative adversarial nature of the malicious information propagation process, considering that user behavior is influenced by both malicious and positive information during the propagation process, evolutionary game theory and multiple linear regression are introduced, and internal and external behavioral factors of the user are synthesized to construct influential functions that quantify malicious information and positive information. Meanwhile, the influence matrix is introduced when quantifying information to construct a weighted malicious information propagation network further. Second, regarding the problem of assessing user influence in the malicious information propagation space, considering the advantages of PageRank in measuring the importance of web pages and combining the timeliness of malicious information propagation, an improved algorithm T-PageRank (Timeliness-PageRank) based on timeliness is proposed. Introducing the time decay factor into the PageRank algorithm effectively enhances the accuracy and timeliness of the influence assessment of malicious information propagation. Finally, regarding the complexity of the propagation space of malicious information and considering that Graph Attention Network (GAT) can effectively capture complex relationships between nodes, combined with user influence, a malicious information popularity prediction model based on GAT is constructed. The model learns the complex interaction between users by using GAT and updates the feature representation of users so that it can be used for subsequent malicious information popularity prediction tasks. The experiment shows that the model can not only accurately assess the influence of users but also effectively predict the popularity of malicious information propagation.
期刊介绍:
IEEE Transactions on Services Computing encompasses the computing and software aspects of the science and technology of services innovation research and development. It places emphasis on algorithmic, mathematical, statistical, and computational methods central to services computing. Topics covered include Service Oriented Architecture, Web Services, Business Process Integration, Solution Performance Management, and Services Operations and Management. The transactions address mathematical foundations, security, privacy, agreement, contract, discovery, negotiation, collaboration, and quality of service for web services. It also covers areas like composite web service creation, business and scientific applications, standards, utility models, business process modeling, integration, collaboration, and more in the realm of Services Computing.