{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T06:52:29Z","timestamp":1775890349104,"version":"3.50.1"},"reference-count":42,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T00:00:00Z","timestamp":1460332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF-1422116"],"award-info":[{"award-number":["CCF-1422116"]}]},{"name":"NSF Career Award","award":["0953284"],"award-info":[{"award-number":["0953284"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2016,5,5]]},"abstract":"<jats:p>Online social networks have become an effective and important social platform for communication, opinions exchange, and information sharing. However, they also make it possible for rapid and wide misinformation diffusion, which may lead to pernicious influences on individuals or society. Hence, it is extremely important and necessary to detect the misinformation propagation by placing monitors.<\/jats:p>\n          <jats:p>\n            In this article, we first define a general misinformation-detection problem for the case where the knowledge about misinformation sources is lacking, and show its equivalence to the influence-maximization problem in the reverse graph. Furthermore, considering node vulnerability, we aim to detect the misinformation reaching to a specific user. Therefore, we study a \u03c4-Monitor Placement problem for cases where partial knowledge of misinformation sources is available and prove its #\n            <jats:italic>P<\/jats:italic>\n            complexity. We formulate a corresponding integer program, tackle exponential constraints, and propose a Minimum Monitor Set Construction (MMSC) algorithm, in which the cut-set\n            <jats:sup>2<\/jats:sup>\n            has been exploited in the estimation of reachability of node pairs. Moreover, we generalize the problem from a single target to multiple central nodes and propose another algorithm based on a Monte Carlo sampling technique. Extensive experiments on real-world networks show the effectiveness of proposed algorithms with respect to minimizing the number of monitors.\n          <\/jats:p>","DOI":"10.1145\/2885494","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T18:01:37Z","timestamp":1460397697000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["Misinformation in Online Social Networks"],"prefix":"10.1145","volume":"34","author":[{"given":"Huiling","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, Florida"}]},{"given":"Md Abdul","family":"Alim","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, Florida"}]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, Florida"}]},{"given":"My T.","family":"Thai","sequence":"additional","affiliation":[{"name":"Ton Duc Thang University and University of Florida, Gainesville, Florida"}]},{"given":"Hien T.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Ton Duc Thang University, Ho Chi Minh City, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2016,4,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963499"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988688.1988749"},{"key":"e_1_2_1_3_1","volume-title":"ICWSM 10","author":"Cha Meeyoung","year":"2010"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526806"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.118"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/972352"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0012948"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.34"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718518"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503792.2503797"},{"key":"e_1_2_1_13_1","unstructured":"http:\/\/snap.stanford.edu\/data. Stanford large network dataset collection.  http:\/\/snap.stanford.edu\/data. Stanford large network dataset collection."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJEM.2009.031564"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517040"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501025.2501027"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989734.1989736"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Sejeong Kwon Meeyoung Cha Kyomin Jung Wei Chen and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In ICDM. 1103--1108.  Sejeong Kwon Meeyoung Cha Kyomin Jung Wei Chen and Yajun Wang. 2013. Prominent features of rumor propagation in online social media. In ICDM. 1103--1108.","DOI":"10.1109\/ICDM.2013.61"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2184305.2184316"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1529100612451018"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487584"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2256902"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964869"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535526"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380718.2380746"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.153"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.153"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.136"},{"key":"e_1_2_1_31_1","unstructured":"Vahed Qazvinian Emily Rosengren Dragomir R. Radev and Qiaozhu Mei. 2011. Rumor has it: Identifying misinformation in microblogs. In EMNLP. 1589--1599.   Vahed Qazvinian Emily Rosengren Dragomir R. Radev and Qiaozhu Mei. 2011. Rumor has it: Identifying misinformation in microblogs. In EMNLP. 1589--1599."},{"key":"e_1_2_1_32_1","unstructured":"Jacob Ratkiewicz Michael Conover Mark Meiss Bruno Gon\u00e7alves Alessandro Flammini and Filippo Menczer. 2011. Detecting and tracking political abuse in social media. In ICWSM.  Jacob Ratkiewicz Michael Conover Mark Meiss Bruno Gon\u00e7alves Alessandro Flammini and Filippo Menczer. 2011. Detecting and tracking political abuse in social media. In ICWSM."},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 29th International Conference on Machine Learning (ICML). 313--320","author":"Rodriguez Manuel Gomez","year":"2012"},{"key":"e_1_2_1_34_1","volume-title":"SPIE Defense, Security, and Sensing","author":"Seo Eunsoo"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158885"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871737"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-120571"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1137\/0208032"},{"key":"e_1_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Gadi Wolfsfeld Elad Segev and Tamir Sheafer. 2013. Social media and the Arab Spring: Politics comes first. The International Journal of Press\/Politics 18 2 (2013) 115--137.  Gadi Wolfsfeld Elad Segev and Tamir Sheafer. 2013. Social media and the Arab Spring: Politics comes first. The International Journal of Press\/Politics 18 2 (2013) 115--137.","DOI":"10.1177\/1940161212471716"},{"key":"e_1_2_1_40_1","unstructured":"Maria S. Zaragoza R. S. Belli and Kristie E. Payment. 2006. Misinformation effects and the suggestibility of eyewitness memory. Do Justice and Let the Sky Fall: Elizabeth F. Loftus and her Contributions to Science Law and Academic Freedom (2006) 35--63.  Maria S. Zaragoza R. S. Belli and Kristie E. Payment. 2006. Misinformation effects and the suggestibility of eyewitness memory. Do Justice and Let the Sky Fall: Elizabeth F. Loftus and her Contributions to Science Law and Academic Freedom (2006) 35--63."},{"key":"e_1_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Zhao Zhang Wen Xu Weili Wu and Ding-Zhu Du. 2015. A novel approach for detecting multiple rumor sources in networks with partial observations. Journal of Combinatorial Optimization (2015) 1--15.  Zhao Zhang Wen Xu Weili Wu and Ding-Zhu Du. 2015. A novel approach for detecting multiple rumor sources in networks with partial observations. Journal of Combinatorial Optimization (2015) 1--15.","DOI":"10.1007\/s10878-015-9939-x"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-014-0003-2"}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2885494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2885494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:14Z","timestamp":1750273514000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2885494"}},"subtitle":["Detect Them All with a Limited Budget"],"short-title":[],"issued":{"date-parts":[[2016,4,11]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,5,5]]}},"alternative-id":["10.1145\/2885494"],"URL":"https:\/\/doi.org\/10.1145\/2885494","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"value":"1046-8188","type":"print"},{"value":"1558-2868","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,11]]},"assertion":[{"value":"2015-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}