Defending against Malicious Influence Control in Online Leader-Follower Social Networks
Liwang Zhu,Xiaotian Zhou,Jiahe Tian,Wei Li,Zhongzhi Zhang
DOI: https://doi.org/10.1109/tifs.2024.3383244
IF: 7.231
2024-01-01
IEEE Transactions on Information Forensics and Security
Abstract:The formation of opinions is fundamentally a network-based process, where the opinions of individuals in a social network exchange, evolve, and eventually convergence towards a specific distribution. However, this dynamic process may be susceptible to manipulation by adversarial entities, who aim to maliciously influence the opinion formulation. The adversary may engage in extensive influence campaigns, disseminating misinformation among populations, thereby potentially destabilizing societies. It is thus of significance to develop strategies to defend against such attacks, which are essential for fostering a healthy environment for information sharing, social deliberation, and opinion formation. In this paper, we investigate a scenario wherein an external adversary aims to maliciously alter the opinions of a general social graph. This is achieved by targeting several selected nodes, referred to as followers. Concurrently, we explore a counter-strategy, aiming to negate the influence of the adversary with malicious intents. This involves identifying a subset of nodes to act as followers of a defending leader, thereby minimizing the adversary’s impact. Since this problem can be framed as a non-increasing supermodular minimization problem, we develop a (1-1/e) approximation greedy algorithm consequently. Moreover, to overcome the computation challenge for large-scale networks, we establish an efficient approximation to the key quantity of the greedy algorithm. This refinement significantly enhances computational efficiency and scalability, making the algorithm applicable to networks with millions of nodes. Extensive simulation results on various real-world networks demonstrate the superior performance of our improved algorithm over existing algorithms and other baseline schemes based on centrality measures. In particular, our improved algorithm scales to networks of considerable size, with negligible sacrifice on the quality of solutions.
computer science, theory & methods,engineering, electrical & electronic