ICE: Information Credibility Evaluation on Social Media via Representation Learning

نویسندگان

  • Qiang Liu
  • Shu Wu
  • Feng Yu
  • Liang Wang
  • Tieniu Tan
چکیده

With the rapid growth of social media, rumors are also spreading widely on social media, such as microblog, and bring negative effects to human life. Nowadays, information credibility evaluation has drawn attention from academic and industrial communities. Current methods mainly focus on feature engineering and achieve some success. However, feature engineering based methods often require a lot of labor and cannot fully reveal the underlying relations among data. In our viewpoint, the key elements of evaluating credibility are concluded as who, what, when, and how. These existing methods cannot well model the correlation among these key elements during the spreading of microblogs. In this paper, we propose a novel representation learning method, Information Credibility Evaluation (ICE), to learn representations of information credibility on social media. In ICE, latent representations are learnt for modeling who, what, when, and how, and these key elements means user credibility, behavior types, temporal properties, and comment attitudes respectively. The aggregation of these factors in the microblog spreading process yields the representation of a user’s behavior, and the aggregation of these dynamic representations generates the credibility representation of an event spreading on social media. Besides, in ICE, a pairwise learning method is applied to maximize the credibility difference between rumors and nonrumors. To evaluate ICE, we conduct a series of experiments on a Sina Weibo dataset, and the experimental results show that the proposed ICE model outperforms the state-of-the-art methods.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

A Subjective Credibility Model for Participatory Media

We propose a method to determine the credibility of messages that are posted in participatory media (such as blogs), of use in recommender systems designed to provide users with messages that are considered to be the most credible to them. Our approach draws from theories developed in sociology, political science, and information science – this results in a method for evaluating the credibility...

متن کامل

Measuring User Credibility in Social Media

People increasingly use social media to get first-hand news and information. During disasters such as Hurricane Sandy and the tsunami in Japan people used social media to report injuries as well as send out their requests. During social movements such as Occupy Wall Street (OWS) and the Arab Spring, people extensively used social media to organize their events and spread the news. As more peopl...

متن کامل

How do People Evaluate Electronic Word-Of-Mouth? Informational and Normative Based Determinants of Perceived Credibility of Online Consumer Recommendations in China

This study empirically examined the informational and normative based determinants of perceived credibility of online consumer recommendations in China. Past literature demonstrated that informational influence is important in affecting reader’s evaluation of incoming information and the effectiveness of a communication. This study extends from the previous Word-of-Mouth studies by including th...

متن کامل

Image Classification via Sparse Representation and Subspace Alignment

Image representation is a crucial problem in image processing where there exist many low-level representations of image, i.e., SIFT, HOG and so on. But there is a missing link across low-level and high-level semantic representations. In fact, traditional machine learning approaches, e.g., non-negative matrix factorization, sparse representation and principle component analysis are employed to d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1609.09226  شماره 

صفحات  -

تاریخ انتشار 2016