An Approach to Identify Epidemic Diseases Rumors in Social Networks ‎using Deep Learning Techniques

Document Type : Persian Original Article

Authors

1 Department of Computer Engineering, Ilam Branch, Islamic Azad University, Ilam, Iran.

2 Department of Computer Engineering, Abadan Branch, Islamic Azad University, Abadan, Iran.

Abstract

One of the most important issues in social networks is the high volume of rumors that are spread by human or machine ‎agents. In such situations, automatic detection of rumors to keep public opinion safe from their potential dangers is of ‎great importance. In this research, using deep learning techniques, a new solution for automatically detecting rumors ‎related to epidemic diseases in social networks will be presented. In the proposed method, first the content of existing ‎messages is prepared for processing in the next steps. Also, weight matrix format has been used to describe content ‎characteristics. Then, in the second step of the proposed method, the convolutional neural network is used to extract the ‎set of suitable features from the matrix of features obtained from the previous step. In this way, the matrix of content ‎features is used as the input of the deep neural network, and the weight values obtained in the last fully connected layer of ‎this neural network are used as the features extracted from it. Finally, the aggregation of several binary classifiers is used ‎in order to detect rumors and classify the features extracted through convolutional neural network. For this purpose, the ‎extracted features are simultaneously processed by several learning models and the final output of the proposed system is ‎determined by voting the outputs of these three algorithms. The results of this research show that by using the proposed ‎method, rumors can be detected with an average accuracy of 98.8%, which shows an improvement of at least 2.4% in ‎detection accuracy compared to the previous methods.‎

Keywords


[1] U. Can and B. Alatas, "A new direction in social network analysis: Online social network analysis problems and applications," Physica A: Statistical Mechanics and its Applications, vol. 535, p. 122372, 2019.
[2] J. J. Lotf, M. A. Azgomi, and M. R. E. Dishabi, "An improved influence maximization method for social networks based on genetic algorithm," Physica A: Statistical Mechanics and its Applications, vol. 586, p. 126480, 2022.
[3] M. Hosseini, A. J. Sabet, S. He, and D. Aguiar, "Interpretable fake news detection with topic and deep variational models," Online Social Networks and Media, vol. 36, p. 100249, 2023.
[4] J. Chen and Y. Wang, "Social media use for health purposes: systematic review," Journal of medical Internet research, vol. 23, no. 5, p. e17917, 2021.
[5] K. Zhou, Y. Yang, Y. Qiao, and T. Xiang, "Domain adaptive ensemble learning," IEEE Transactions on Image Processing, vol. 30, pp. 8008-8018, 2021.
[6] N. Mungoli, "Adaptive Ensemble Learning: Boosting Model Performance through Intelligent Feature Fusion in Deep Neural Networks," arXiv preprint arXiv:2304.02653, 2023.
[7] D. Antonakaki, P. Fragopoulou, and S. Ioannidis, "A survey of Twitter research: Data model, graph structure, sentiment analysis and attacks," Expert Systems with Applications, vol. 164, p. 114006, 2021.
[8] S. Sadiq, A. Mehmood, S. Ullah, M. Ahmad, G. S. Choi, and B.-W. On, "Aggression detection through deep neural model on twitter," Future Generation Computer Systems, vol. 114, pp. 120-129, 2021.
[9] L. Ilias and I. Roussaki, "Detecting malicious activity in Twitter using deep learning techniques," Applied Soft Computing, vol. 107, p. 107360, 2021.
[10] P. K. Roy, J. P. Singh, and S. Banerjee, "Deep learning to filter SMS Spam," Future Generation Computer Systems, vol. 102, pp. 524-533, 2020.
[11] Z. Alom, B. Carminati, and E. Ferrari, "A deep learning model for Twitter spam detection," Online Social Networks and Media, vol. 18, p. 100079, 2020.
[12] Q. Zhou, J. Wu, and L. Duan, "Recommendation attack detection based on deep learning," Journal of Information Security and Applications, vol. 52, p. 102493, 2020.
[13] L. Wu, Q. Zhang, C.-H. Chen, K. Guo, and D. Wang, "Deep learning techniques for community detection in social networks," IEEE Access, vol. 8, pp. 96016-96026, 2020.
[14] M. Orabi, D. Mouheb, Z. Al Aghbari, and I. Kamel, "Detection of bots in social media: a systematic review," Information Processing & Management, vol. 57, no. 4, p. 102250, 2020.
[15] N. El-Mawass, P. Honeine, and L. Vercouter, "SimilCatch: Enhanced social spammers detection on twitter using Markov random fields," Information processing & management, vol. 57, no. 6, p. 102317, 2020.
[16] A. A. Orunsolu, A. S. Sodiya, and A. Akinwale, "A predictive model for phishing detection," Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 2, pp. 232-247, 2022.
[17] M. Al-Sarem, A. Alsaeedi, F. Saeed, W. Boulila, and O. AmeerBakhsh, "A novel hybrid deep learning model for detecting COVID-19-related rumors on social media based on LSTM and concatenated parallel CNNs," Applied Sciences, vol. 11, no. 17, p. 7940, 2021.
[18] M. Heidari, H. James Jr, and O. Uzuner, "An empirical study of machine learning algorithms for social media bot detection," in 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021, pp. 1-5: IEEE.
[19] J. Rodríguez-Ruiz, J. I. Mata-Sánchez, R. Monroy, O. Loyola-Gonzalez, and A. López-Cuevas, "A one-class classification approach for bot detection on Twitter," Computers & Security, vol. 91, p. 101715, 2020.
[20] Y. Feng, J. Li, L. Jiao, and X. Wu, "Towards learning-based, content-agnostic detection of social bot traffic," IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 5, pp. 2149-2163, 2020.
[21] S. Feng, H. Wan, N. Wang, and M. Luo, "BotRGCN: Twitter bot detection with relational graph convolutional networks," in Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2021, pp. 236-239.
[22] S. Chen, "Research on Fine-Grained Classification of Rumors in Public Crisis——Take the COVID-19 incident as an example," in E3S Web of conferences, 2020, vol. 179, p. 02027: E3S Web of Conferences.
[23] S. Alqurashi, B. Hamoui, A. Alashaikh, A. Alhindi, and E. Alanazi, "Eating garlic prevents COVID-19 infection: Detecting misinformation on the Arabic content of Twitter," arXiv preprint arXiv:2101.05626, 2021.
[24] L. Wang, W. Wang, T. Chen, J. Ke, and B. Tang, "Deep Attention Model with Multiple Features for Rumor Identification," in Frontiers in Cyber Security: Third International Conference, FCS 2020, Tianjin, China, November 15–17, 2020, Proceedings 3, 2020, pp. 65-82: Springer.
[25] L. Alsudias and P. Rayson, "COVID-19 and Arabic Twitter: How can Arab world governments and public health organizations learn from social media?," in Proceedings of the 1st Workshop on NLP for COVID-19 at ACL 2020, 2020.
[26] P. Rani, V. Jain, J. Shokeen, and A. Balyan, "Blockchain-based rumor detection approach for COVID-19," Journal of Ambient Intelligence and Humanized Computing, pp. 1-15, 2022.
[27] H.-y. Lu, J. Yang, W. Fang, X. Song, and C. Wang, "A deep neural networks-based fusion model for COVID-19 rumor detection from online social media," Data Technologies and Applications, no. ahead-of-print, 2022.
[28] V. Mottaghi, M. Esmaeili, G. A. Bazaee, and M. A. Afshar Kazemi, "Providing a Hybrid Approach Based on Deep learning And Machine Learning to Detect fake news-A Case Study of Persian News in the Field of COVID-19," Sciences and Techniques of Information Management, vol. 8, no. 3, pp. 283-316, 2022.
[29] A. Kumar, J. P. Singh, and A. K. Singh, "COVID-19 Fake News Detection Using Ensemble-Based Deep Learning Model," IT Professional, vol. 24, no. 2, pp. 32-37, 2022.
[30] J. Yang and Y. Pan, "COVID-19 Rumor Detection on Social Networks Based on Content Information and User Response," Frontiers in Physics, vol. 9, p. 763081, 2021.
[31] A. M. Almars, M. Almaliki, T. H. Noor, M. M. Alwateer, and E. Atlam, "Hann: Hybrid attention neural network for detecting covid-19 related rumors," IEEE Access, vol. 10, pp. 12334-12344, 2022.
[32] C. Silva and B. Ribeiro, "The importance of stop word removal on recall values in text categorization," in Proceedings of the International Joint Conference on Neural Networks, 2003., 2003, vol. 3, pp. 1661-1666: IEEE.
[33] C. Ramasubramanian and R. Ramya, "Effective pre-processing activities in text mining using improved porter’s stemming algorithm," International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 12, pp. 4536-4538, 2013.
[34] K. Ghag and K. Shah, "SentiTFIDF–Sentiment classification using relative term frequency inverse document frequency," International Journal of Advanced Computer Science and Applications, vol. 5, no. 2, 2014.
[35] J. Han, M. Kamber, and J. Pei, "Data mining concepts and techniques third edition," University of Illinois at Urbana-Champaign Micheline Kamber Jian Pei Simon Fraser University, 2012.
[36] R. R. Asaad and R. M. Abdulhakim, "The Concept of Data Mining and Knowledge Extraction Techniques," Qubahan Academic Journal, vol. 1, no. 2, pp. 17-20, 2021.
[37] D. J. Hand, "Principles of data mining," Drug safety, vol. 30, pp. 621-622, 2007.