{"id":"https://openalex.org/W2992149285","doi":"https://doi.org/10.1109/kse.2019.8919356","title":"Multiple Topics Misinformation blocking in Online Social Networks","display_name":"Multiple Topics Misinformation blocking in Online Social Networks","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2992149285","doi":"https://doi.org/10.1109/kse.2019.8919356","mag":"2992149285"},"language":"en","primary_location":{"id":"doi:10.1109/kse.2019.8919356","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse.2019.8919356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009841501","display_name":"Dung Van Pham","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dung V. Pham","raw_affiliation_strings":["People\u2019s Security Academy, Hanoi, Vietnam","People's Security Academy, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"People\u2019s Security Academy, Hanoi, Vietnam","institution_ids":[]},{"raw_affiliation_string":"People's Security Academy, Hanoi, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111902416","display_name":"Hieu V. Duong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hieu V. Duong","raw_affiliation_strings":["People\u2019s Security Academy, Hanoi, Vietnam","People's Security Academy, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"People\u2019s Security Academy, Hanoi, Vietnam","institution_ids":[]},{"raw_affiliation_string":"People's Security Academy, Hanoi, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021107068","display_name":"Canh V. Pham","orcid":"https://orcid.org/0000-0002-8118-1768"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Canh V. Pham","raw_affiliation_strings":["People\u2019s Security Academy, Hanoi, Vietnam","People's Security Academy, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"People\u2019s Security Academy, Hanoi, Vietnam","institution_ids":[]},{"raw_affiliation_string":"People's Security Academy, Hanoi, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066134545","display_name":"Bui Q. Bao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bui Q. Bao","raw_affiliation_strings":["People\u2019s Security Academy, Hanoi, Vietnam","People's Security Academy, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"People\u2019s Security Academy, Hanoi, Vietnam","institution_ids":[]},{"raw_affiliation_string":"People's Security Academy, Hanoi, Vietnam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108744953","display_name":"Anh V. Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I70349855","display_name":"Vietnam Academy of Science and Technology","ror":"https://ror.org/02wsd5p50","country_code":"VN","type":"funder","lineage":["https://openalex.org/I70349855"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Anh V. Nguyen","raw_affiliation_strings":["Institute of Information Technology, Vietnam Academy of Science and Technology, Hanoi, Vietnam"],"affiliations":[{"raw_affiliation_string":"Institute of Information Technology, Vietnam Academy of Science and Technology, Hanoi, Vietnam","institution_ids":["https://openalex.org/I70349855"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5009841501"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1448,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.47863248,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/misinformation","display_name":"Misinformation","score":0.9248738288879395},{"id":"https://openalex.org/keywords/submodular-set-function","display_name":"Submodular set function","score":0.8466196060180664},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.7823165655136108},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7462896108627319},{"id":"https://openalex.org/keywords/greedy-algorithm","display_name":"Greedy algorithm","score":0.583585798740387},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5326886773109436},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.523781955242157},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5224965214729309},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4505102336406708},{"id":"https://openalex.org/keywords/approximation-algorithm","display_name":"Approximation algorithm","score":0.43343597650527954},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32466956973075867},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.2399890422821045},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.226948082447052},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16867861151695251},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12359163165092468},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10781064629554749}],"concepts":[{"id":"https://openalex.org/C2776990098","wikidata":"https://www.wikidata.org/wiki/Q13579947","display_name":"Misinformation","level":2,"score":0.9248738288879395},{"id":"https://openalex.org/C178621042","wikidata":"https://www.wikidata.org/wiki/Q7631710","display_name":"Submodular set function","level":2,"score":0.8466196060180664},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.7823165655136108},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7462896108627319},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.583585798740387},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5326886773109436},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.523781955242157},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5224965214729309},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4505102336406708},{"id":"https://openalex.org/C148764684","wikidata":"https://www.wikidata.org/wiki/Q621751","display_name":"Approximation algorithm","level":2,"score":0.43343597650527954},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32466956973075867},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2399890422821045},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.226948082447052},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16867861151695251},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12359163165092468},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10781064629554749},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kse.2019.8919356","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kse.2019.8919356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 11th International Conference on Knowledge and Systems Engineering (KSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1560267311","https://openalex.org/W1585155723","https://openalex.org/W1983916623","https://openalex.org/W2030701825","https://openalex.org/W2046651078","https://openalex.org/W2061820396","https://openalex.org/W2080379754","https://openalex.org/W2085419924","https://openalex.org/W2108614537","https://openalex.org/W2111708605","https://openalex.org/W2167313676","https://openalex.org/W2324763723","https://openalex.org/W2402355993","https://openalex.org/W2512056455","https://openalex.org/W2774494196","https://openalex.org/W2788460644","https://openalex.org/W2791518874","https://openalex.org/W2898331500","https://openalex.org/W2963646940","https://openalex.org/W3126072720"],"related_works":["https://openalex.org/W2402949237","https://openalex.org/W2964314169","https://openalex.org/W2594118609","https://openalex.org/W2950365512","https://openalex.org/W2765425000","https://openalex.org/W2735578456","https://openalex.org/W1608444752","https://openalex.org/W4389478405","https://openalex.org/W2963059222","https://openalex.org/W3204684126"],"abstract_inverted_index":{"Misinformation":[0],"prevention":[1],"has":[2],"received":[3],"much":[4],"attention":[5],"due":[6],"to":[7,11,46,56],"its":[8],"important":[9],"role":[10],"user":[12],"community.":[13],"However,":[14],"recent":[15],"studies":[16],"ignore":[17],"the":[18,21,26,33,48,58,70,97,139,144,153,159],"influence":[19],"of":[20,23,28,35,37,50,60,72,78,85,120,158],"topics":[22,61,77],"misinformation":[24,38,73,79],"in":[25,44,62],"process":[27],"information":[29,63],"dissemination.":[30,64],"In":[31,65],"fact,":[32],"spread":[34],"propagation":[36],"depends":[39],"on":[40,107,136,150],"their":[41],"topics.":[42],"Therefore,":[43],"order":[45],"improve":[47],"effectiveness":[49,154],"preventing":[51],"false":[52],"information,":[53],"we":[54,68,109],"need":[55],"consider":[57],"effect":[59],"this":[66],"paper,":[67],"study":[69],"problem":[71],"blocking":[74],"which":[75,115,162],"considers":[76],"sources":[80],"by":[81,141],"removing":[82],"a":[83,101,111,117,127],"set":[84],"nodes,":[86],"called":[87],"MTMB":[88,93],"problem.":[89],"We":[90,124],"show":[91],"that":[92],"is":[94,100],"NP-hard":[95],"and":[96,103,155],"objective":[98,145],"function":[99],"monotone":[102],"submodular":[104],"function.":[105,146],"Based":[106],"that,":[108],"propose":[110,126],"Greedy":[112,129],"Algorithm":[113,130],"(GA),":[114],"provides":[116],"approximation":[118],"ratio":[119],"(1":[121],"-":[122],"1/\u221ae).":[123],"further":[125],"Scalable":[128],"(SGA),":[131],"an":[132],"efficient":[133],"algorithm":[134],"based":[135],"speeding":[137],"up":[138],"GA":[140],"effective":[142],"estimating":[143],"Experiments":[147],"are":[148],"conducted":[149],"networks":[151],"showing":[152],"running":[156],"time":[157],"proposed":[160],"algorithms":[161],"outperform":[163],"other":[164],"methods.":[165]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
