{"title":"基于内容信任的谣言传播模型","authors":"Meiling Jin, Fengming Liu","doi":"10.1109/ITNEC.2019.8729539","DOIUrl":null,"url":null,"abstract":"With the development of network technology, the rumors of network rumors are getting more and more serious, and the spread of network rumors has become a research hotspot. Firstly, based on the content characteristics of the information, this paper combines the three characteristics of rumors: subject universality, impact severity and event ambiguity, and establishes a content trust function. Secondly, the micro-Markov chain approximation method is used to establish the discreteness of rumor communication. The model, continuity model and continuous model based on trust function, and then calculate the corresponding rumor propagation threshold. Finally, through numerical simulation, the validity of the three properties of rumors is verified, and the validity of the model is proved. Good suppression of rumor spread.","PeriodicalId":202966,"journal":{"name":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A rumor propagation model based on content trust\",\"authors\":\"Meiling Jin, Fengming Liu\",\"doi\":\"10.1109/ITNEC.2019.8729539\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development of network technology, the rumors of network rumors are getting more and more serious, and the spread of network rumors has become a research hotspot. Firstly, based on the content characteristics of the information, this paper combines the three characteristics of rumors: subject universality, impact severity and event ambiguity, and establishes a content trust function. Secondly, the micro-Markov chain approximation method is used to establish the discreteness of rumor communication. The model, continuity model and continuous model based on trust function, and then calculate the corresponding rumor propagation threshold. Finally, through numerical simulation, the validity of the three properties of rumors is verified, and the validity of the model is proved. Good suppression of rumor spread.\",\"PeriodicalId\":202966,\"journal\":{\"name\":\"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNEC.2019.8729539\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNEC.2019.8729539","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the development of network technology, the rumors of network rumors are getting more and more serious, and the spread of network rumors has become a research hotspot. Firstly, based on the content characteristics of the information, this paper combines the three characteristics of rumors: subject universality, impact severity and event ambiguity, and establishes a content trust function. Secondly, the micro-Markov chain approximation method is used to establish the discreteness of rumor communication. The model, continuity model and continuous model based on trust function, and then calculate the corresponding rumor propagation threshold. Finally, through numerical simulation, the validity of the three properties of rumors is verified, and the validity of the model is proved. Good suppression of rumor spread.