Multilevel User Credibility Assessment in Social Networks
Abstract: Online social networks are major platforms for disseminating both real and fake news. Many users, intentionally or unintentionally, spread harmful content, fake news, and rumors in fields such as politics and business. Consequently, numerous studies have been conducted in recent years to assess user credibility. A significant shortcoming of most existing methods is that they categorize users as either real or fake. However, in real-world applications, it is often more desirable to consider several levels of user credibility. Another limitation is that existing approaches only utilize a portion of important features, which reduces their performance. In this paper, due to the lack of an appropriate dataset for multilevel user credibility assessment, we first design a method to collect data suitable for assessing credibility at multiple levels. Then, we develop the MultiCred model, which places users at one of several levels of credibility based on a rich and diverse set of features extracted from users' profiles, tweets, and comments. MultiCred leverages deep LLMs to analyze textual data and deep neural models to process non-textual features. Our extensive experiments reveal that MultiCred significantly outperforms existing approaches in terms of several accuracy measures.
- N. Singh, T. Sharma, A. Thakral, and T. Choudhury, “Detection of fake profile in online social networks using machine learning,” in 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE). IEEE, 2018, pp. 231–234.
- M. A. Wani, N. Agarwal, S. Jabin, and S. Z. Hussain, “Analyzing real and fake users in facebook network based on emotions,” in 11th International Conference on Communication Systems & Networks, COMSNETS 2019, Bengaluru, India, January 7-11, 2019. IEEE, 2019, pp. 110–117. [Online]. Available: https://doi.org/10.1109/COMSNETS.2019.8711124
- K. Zarei, R. Farahbakhsh, and N. Crespi, “Deep dive on politician impersonating accounts in social media,” in 2019 IEEE Symposium on Computers and Communications, ISCC 2019, Barcelona, Spain, June 29 - July 3, 2019. IEEE, 2019, pp. 1–6. [Online]. Available: https://doi.org/10.1109/ISCC47284.2019.8969645
- P. Wanda and H. J. Jie, “Deepprofile: Finding fake profile in online social network using dynamic CNN,” J. Inf. Secur. Appl., vol. 52, p. 102465, 2020. [Online]. Available: https://doi.org/10.1016/j.jisa.2020.102465
- K. K. Bharti and S. Pandey, “Fake account detection in twitter using logistic regression with particle swarm optimization,” Soft Comput., vol. 25, no. 16, pp. 11 333–11 345, 2021. [Online]. Available: https://doi.org/10.1007/s00500-021-05930-y
- M. M. Swe and N. N. Myo, “Fake accounts detection on twitter using blacklist,” in 17th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2018, Singapore, Singapore, June 6-8, 2018. IEEE Computer Society, 2018, pp. 562–566. [Online]. Available: https://doi.org/10.1109/ICIS.2018.8466499
- E. M. Clark, J. R. Williams, C. A. Jones, R. A. Galbraith, C. M. Danforth, and P. S. Dodds, “Sifting robotic from organic text: A natural language approach for detecting automation on twitter,” J. Comput. Sci., vol. 16, pp. 1–7, 2016. [Online]. Available: https://doi.org/10.1016/j.jocs.2015.11.002
- M. U. S. Khan, M. Ali, A. Abbas, S. U. Khan, and A. Y. Zomaya, “Segregating spammers and unsolicited bloggers from genuine experts on twitter,” IEEE Trans. Dependable Secur. Comput., vol. 15, no. 4, pp. 551–560, 2018. [Online]. Available: https://doi.org/10.1109/TDSC.2016.2616879
- P. V. Phad and M. K. Chavan, “Detecting compromised high-profile accounts on social networks,” in 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, Bengaluru, India, July 10-12, 2018. IEEE, 2018, pp. 1–4. [Online]. Available: https://doi.org/10.1109/ICCCNT.2018.8493851
- A.-Z. Ala’M, J. Alqatawna, and H. Paris, “Spam profile detection in social networks based on public features,” in 2017 8th International Conference on information and Communication Systems (ICICS). IEEE, 2017, pp. 130–135.
- M. Z. Alom, B. Carminati, and E. Ferrari, “Detecting spam accounts on twitter,” in IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2018, Barcelona, Spain, August 28-31, 2018, U. Brandes, C. Reddy, and A. Tagarelli, Eds. IEEE Computer Society, 2018, pp. 1191–1198. [Online]. Available: https://doi.org/10.1109/ASONAM.2018.8508495
- R. Aswani, A. K. Kar, and P. V. Ilavarasan, “Detection of spammers in twitter marketing: A hybrid approach using social media analytics and bio inspired computing,” Inf. Syst. Frontiers, vol. 20, no. 3, pp. 515–530, 2018. [Online]. Available: https://doi.org/10.1007/s10796-017-9805-8
- K. S. Adewole, N. B. Anuar, A. Kamsin, and A. K. Sangaiah, “SMSAD: a framework for spam message and spam account detection,” Multim. Tools Appl., vol. 78, no. 4, pp. 3925–3960, 2019. [Online]. Available: https://doi.org/10.1007/s11042-017-5018-x
- P. K. Verma, P. Agrawal, V. Madaan, and C. Gupta, “Ucred: fusion of machine learning and deep learning methods for user credibility on social media,” Soc. Netw. Anal. Min., vol. 12, no. 1, p. 54, 2022. [Online]. Available: https://doi.org/10.1007/s13278-022-00880-1
- J. Devlin, M. Chang, K. Lee, and K. Toutanova, “BERT: pre-training of deep bidirectional transformers for language understanding,” in Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019, Minneapolis, MN, USA, June 2-7, 2019, Volume 1 (Long and Short Papers), J. Burstein, C. Doran, and T. Solorio, Eds. Association for Computational Linguistics, 2019, pp. 4171–4186. [Online]. Available: https://doi.org/10.18653/v1/n19-1423
- K. Fukushima, “Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position,” Biological Cybernetics, vol. 36, pp. 193–202, 1980.
- F. C. Akyon and M. E. Kalfaoglu, “Instagram fake and automated account detection,” in 2019 Innovations in intelligent systems and applications conference (ASYU). IEEE, 2019, pp. 1–7.
- S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, “Fame for sale: efficient detection of fake twitter followers,” Decision Support Systems, vol. 80, pp. 56–71, December 2015.
- K. Shu, D. Mahudeswaran, S. Wang, D. Lee, and H. Liu, “Fakenewsnet: A data repository with news content, social context and dynamic information for studying fake news on social media,” arXiv preprint arXiv:1809.01286, 2019.
- T. Alhindi, S. Petridis, and S. Muresan, “Where is your evidence: Improving fact-checking by justification modeling,” in Proceedings of the First Workshop on Fact Extraction and VERification (FEVER), 2018, pp. 85–90.
- A. D’Ulizia, M. C. Caschera, F. Ferri, and P. Grifoni, “Fake news detection: a survey of evaluation datasets,” PeerJ Comput. Sci., vol. 7, p. e518, 2021. [Online]. Available: https://doi.org/10.7717/peerj-cs.518
- [Online]. Available: https://www.newsguardtech.com/
- J. Schmidhuber, “Deep learning in neural networks: An overview,” Neural networks, vol. 61, pp. 85–117, 2015.
- V. Sanh, L. Debut, J. Chaumond, and T. Wolf, “Distilbert, a distilled version of BERT: smaller, faster, cheaper and lighter,” CoRR, vol. abs/1910.01108, 2019. [Online]. Available: http://arxiv.org/abs/1910.01108
- N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: synthetic minority over-sampling technique,” J. Artif. Intell. Res., vol. 16, pp. 321–357, 2002. [Online]. Available: https://doi.org/10.1613/jair.953
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.