1 research outputs found

    Network interdiction approaches for diminishing misinformation spread in social networks

    Get PDF
    Network interdiction has many applications in many domains, including telecommunications, epidemic control, and social network analysis. In this dissertation, we use network interdiction to devise strategies for the problem of misinformation dissemination in online social networks. These platforms provide the opportunity of quick communication between users, which in a network with malicious accounts can result in the fast spread of rumors and harmful content. We study this topic based on two different approaches. The first approach focuses on interdicting cohesive subgroups of malicious accounts. We use s-clubs, which are subsets of vertices that induce subgraphs of diameter at most s to model the cohesive social subgroups. We consider a defender that can disrupt the vertices of the adversarial network to minimize its threat, which leads us to consider a maximum s-club interdiction problem. Using a new notion of H-heredity in s-clubs, we provide a mixed-integer linear programming formulation for this problem that uses far fewer constraints than the formulation based on standard techniques. We further relate H-heredity to latency-s connected dominating sets and design a decomposition branch-and-cut algorithm for the problem. The second methodology that is studied in this dissertation is to delay the spread of misinformation in the network using first passage times interdiction. The first passage times are defined as the first time each user is exposed to a post shared by another user in the network and is computed using a discrete time Markov chain model. Vertices are interdicted to modify the transition probabilities and increase the propagation times between users who share misinformation and harmful content, and vulnerable users. We show that the problem is NP-hard and provide a mixed-integer linear programming formulation for it. Computational experiments on benchmark instances are conducted for both interdiction approaches based on cohesive subgroups and first passage times in order to assess the computational capabilities of the methods we introduced
    corecore